[4999] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Security issues in Apache?

daemon@ATHENA.MIT.EDU (Steve Neruda)
Tue Apr 8 14:55:36 1997

Date: Tue, 08 Apr 1997 10:18:59 -0400
From: Steve Neruda <nerudas@nationwide.com>
To: Christopher Petrilli <petrilli@amber.org>
CC: Prentiss Riddle <riddle@is.rice.edu>, Richard Costine <rjc@n2k.com>,
        www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

Christopher Petrilli wrote:

> If you're running it, I would recommend you run an absolute minimal
> server on port 80, an run the rest on a totally untrusted port, like
> 8080, thereby elimanting the need to even start the server as root.  This
> would at least restrict the damage that could be done.
> 

Since the server relinquishes root as soon as it's bound to the port is
this added complexity really necessary?  If someone finds a buffer
overflow and gets a shell then it will be under the uid the server is
*currently* running as, not root.

> Again, this is all principle.  The basic theory is that if you can't
> PROVE it's trustable, then it isn't.  Don't trust ANYTHING.
> 
> Christopher

And the problem is that anything more than a very simple program cannot
be proven by mere mortals.  Security is not an absolute thing.  It is a
process of weighing risks against gains.  The reason large companies
choose to connect with a public network such as the Internet is the
forseen gain verses the costs and risks involved with having such a
connection.

Even though you can't prove the security of a system it is important to
use good programming practices and have a security architecture in
mind.  My guess is that 80%+ of the rash of security problems we see
right now could be eliminated by removing scanf() and printf() and any
other nonbounds checking calls from the C programming language.

SteveN

-- 
Steve Neruda                         Steve_Neruda@Nationwide.Com
Senior Internet Consultant           The Internet Technologies Group

home help back first fref pref prev next nref lref last post