[3396] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: SSI #exec

daemon@ATHENA.MIT.EDU (sameer)
Tue Oct 29 00:56:17 1996

From: sameer <sameer@c2.net>
To: robertm@teleport.com (Robert S. Muhlestein)
Date: Mon, 28 Oct 1996 18:48:06 -0800 (PST)
Cc: brennan@ConnActivity.ConnActivity.com, www-security@ns2.rutgers.edu
In-Reply-To: <Pine.SUN.3.92.961028125926.5878C-100000@linda.teleport.com> from "Robert S. Muhlestein" at "Oct 28, 96 01:19:37 pm"
Errors-To: owner-www-security@ns2.rutgers.edu

	In apache you don't need to do any hack. Rather than using
"exec cgi" or "exec cmd" you can use "include virtual."



> While at Teleport we simply commented out the "cmd" source code and
> tied it to a precomile directive.  I, for one, would very much like to
> see the different server authors include this option.  Something like a
> "IncludesNoExecCMD" configuration similar to the "IncludeNoExec" option
> available in most servers now.  Why?  Because if you are running Apache
> you can make this little change without too much difficulty (you still
> need to keep track of the hack and reimplement it in every Apache
> upgrade).  However, Netscape and the others, of course, don't allow you
> to access or alter  the source code (ahh, closed software.  Long live
> GNU!).  I suppose something could be done using NSAPI plugins, but why
> not just a simple configuration option.
> 
> This makes so much sense and I have read server administrators frustrations
> not being able to use ANY SSIs in order to avoid the "exec cmd" while the
> "exec cgi" is only as malicious as the CGI scripts you allow.  In the case
> of a monitored cgi-bin directory, you have control over what "exec cgi"s are
> allowed.
> 
> Someone at Apache, Netscape and everywhere else in server land, please add
> this trivial little option--or at least tell me why you won't.  I have
> submitted a simple little patch to Apache but have heard nothing (the patch
> was for Apache 1.0 or I'd dig it up and repeat it here).
> 
> In short, Rich.  No, no problems except for normal CGI security.  Teleport
> has allowed users to use SSIs without the "cmd" option for a year now
> without adverse affect--other than the normal performance hit from SSIs
> being parsed.  I also highly recommend the X-bit-hack instead of forcing
> everyone to change to .shtml extensions.
> 
> Here are a couple of Teleport resources that explain this to users:
> 
> http://www.teleport.com/support/webweave/SSI.shtml
> http://www.teleport.com/support/webweave/server_parsing.shtml
> 
> Hope this helps...
> 
> ----------------------------------------------------------------------
>                      Robert S. Muhlestein
>                        Web Technologist
>                           NIKE, Inc.
>                Work: robert.muhlestein@nike.com
>                    Personal: rmuhle@q7.com
>                   Old: robertm@teleport.com
>           (Opinions and comments are my own, not NIKE's.)
> ----------------------------------------------------------------------
> 
> 
> On Mon, 28 Oct 1996, Rich Brennan wrote:
> 
> > I'd like to provide server side includes for my users, and I'd also like to
> > provide SSI execution of CGI scripts, but disallow the "cmd" option of
> > executing random scripts/programs. I feel that this is a decent compromise
> > between user available functionality and Web server security. This is probably
> > easy to do with the Apache server I'm using (what a great piece of work,
> > Apache group!).
> >
> > Am I being naive here? Does this solution open me up to anything horrible
> > (assuming that installing CGI programs is controlled). Any comments/insights
> > would be greatly appreciated.
> >
> >
> >
> > Rich
> >
> 


-- 
Sameer Parekh					Voice:   510-986-8770
C2Net						FAX:     510-986-8777
The Internet Privacy Provider
http://www.c2.net/				sameer@c2.net

home help back first fref pref prev next nref lref last post