[Previous] [Next] [Index] [Thread]

Re: Re[2]: Is password good enough?



On Thu, 4 Apr 1996, Mike Bremford wrote:

> Surely if you use a 'secure' interface like SSL, "sniffing" the passwords while
> in transit won't be a problem. I know you can patch telnet and other such
> programs to use SSL as well for the same reason.

Humm.. An SSL telnet patch.  I'd love to know where I could find such a
thing.

> Also, if you create a group, say "http", that your httpd daemon runs as, and
> make the .htaccess and .htpasswd files read only by that group, and not by
> anyone else, then they are as secure as shadow passwords on a UNIX system. (ie
> fairly secure).

This is exactly what we do at Teleport.  Everyone is in group "users" and
the server runs as someone else in a different group. We have server-side
includes active, but have hacked out the <!--#exec cmd=""--> option and
restrict the cgi-bin directory.  Otherwise, there is nothing stopping
someone from <!--#exec cmd="cat /path/to/some/file"-->ing the information
from a file not normally accessible to shell users.  There is also nothing
stopping users from randomly "killing" off server children, etc.  Most
already know this, but it couldn't be repeated enough.

By the way, using method like Mike mentioned is also how we protect
certain files to which some CGI scripts must have write access (i.e.
counter data files, guestbooks, etc.  I use something like the
following (please let me know if you see any reason this is
insecure):

chgrp users <filename>   (all users are in group users, including most
                          admins)

chmod 606 <filename>     (sets read-write for owner and world, but blocks
                          everyone in group users, which is effectively
                          everyone)

Thanks,

Robert Muhlestein
Teleport Creative Services
CGI/Java Guy
cgi@teleport.com


References: