Securing the Apache HTTP Server
629
43.2.4.2. Beware of Syntax Errors
The NFS server determines which file systems to export and which hosts to export these directories to
by consulting the
/etc/exports
file. Be careful not to add extraneous spaces when editing this file.
For instance, the following line in the
/etc/exports
file shares the directory
/tmp/nfs/
to the host
bob.example.com
with read/write permissions.
/tmp/nfs/ bob.example.com(rw)
The following line in the
/etc/exports
file, on the other hand, shares the same directory to the host
bob.example.com
with read-only permissions and shares it to the
world
with read/write permissions
due to a single space character after the hostname.
/tmp/nfs/ bob.example.com (rw)
It is good practice to check any configured NFS shares by using the
showmount
command to verify
what is being shared:
showmount -e
<hostname>
43.2.4.3. Do Not Use the
no_root_squash
Option
By default, NFS shares change the root user to the
nfsnobody
user, an unprivileged user account.
This changes the owner of all root-created files to
nfsnobody
, which prevents uploading of programs
with the setuid bit set.
If
no_root_squash
is used, remote root users are able to change any file on the shared file system
and leave applications infected by trojans for other users to inadvertently execute.
43.2.5. Securing the Apache HTTP Server
The Apache HTTP Server is one of the most stable and secure services that ships with Red Hat
Enterprise Linux. A large number of options and techniques are available to secure the Apache HTTP
Server — too numerous to delve into deeply here.
When configuring the Apache HTTP Server, it is important to read the documentation available for the
application. This includes
Chapter 22, Apache HTTP Server
, and the Stronghold manuals, available at
http://www.redhat.com/docs/manuals/stronghold/
.
System Administrators should be careful when using the following configuration options:
43.2.5.1.
FollowSymLinks
This directive is enabled by default, so be sure to use caution when creating symbolic links to the
document root of the Web server. For instance, it is a bad idea to provide a symbolic link to
/
.
43.2.5.2. The
Indexes
Directive
This directive is enabled by default, but may not be desirable. To prevent visitors from browsing files
on the server, remove this directive.
Содержание ENTERPRISE LINUX 5 - VIRTUAL SERVER ADMINISTRATION
Страница 22: ...xxii ...
Страница 28: ......
Страница 36: ...10 ...
Страница 40: ...14 ...
Страница 96: ...70 ...
Страница 116: ...90 ...
Страница 144: ...118 ...
Страница 146: ......
Страница 158: ...132 ...
Страница 165: ...Installing and Removing Packages 139 Figure 11 7 Installing and removing packages simultaneously ...
Страница 166: ...140 ...
Страница 172: ...146 ...
Страница 178: ......
Страница 228: ...202 ...
Страница 264: ...238 ...
Страница 318: ...292 ...
Страница 330: ...304 ...
Страница 388: ...362 ...
Страница 428: ...402 ...
Страница 452: ......
Страница 458: ...432 ...
Страница 476: ...450 ...
Страница 478: ...452 ...
Страница 494: ...468 ...
Страница 498: ...472 ...
Страница 530: ...504 ...
Страница 536: ...510 ...
Страница 544: ...Chapter 36 Log Files 518 Figure 36 7 Log file contents after five seconds ...
Страница 546: ......
Страница 550: ...524 ...
Страница 576: ......
Страница 584: ...558 ...
Страница 608: ......
Страница 776: ...750 ...
Страница 796: ...770 ...
Страница 800: ...774 ...
Страница 804: ......
Страница 806: ...780 ...
Страница 808: ...782 ...
Страница 816: ...790 ...
Страница 820: ...794 ...
Страница 822: ...796 ...
Страница 830: ...804 ...
Страница 836: ...810 ...
Страница 844: ...818 ...
Страница 848: ...822 ...