From: Randy Terbush Date: Mon, 2 Dec 1996 00:50:10 +0000 (+0000) Subject: Asthetics X-Git-Tag: APACHE_1_2b1~7 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=57a45232f1531ebd03f6409429527d08639a7340;p=apache Asthetics git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@77137 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/suexec.html b/docs/manual/suexec.html index 5c0ebef684..8ce9a7b6f2 100644 --- a/docs/manual/suexec.html +++ b/docs/manual/suexec.html @@ -3,11 +3,11 @@ -

Apache SetUserID Support

+

Apache suEXEC Support


-

What is suEXEC?

+

What is suEXEC?

The suEXEC feature, introduced in Apache 1.2 provides the ability to run CGI programs under user ids different from the user id of the calling webserver. Used properly, this feature can reduce considerably the @@ -17,7 +17,9 @@ steal all the money from your retirement fund. :-) If you aren't familar with managing setuid root programs and the security issues they present, we highly recommend that you not consider using this feature.

-

Enabling suEXEC Support

+
+ +

Enabling suEXEC Support

Having said all that, enabling this feature is purposefully difficult with the intent that it will only be installed by users determined to use it and is not part of the normal install/compile process.

@@ -101,8 +103,10 @@ commands.

Change the path to the suEXEC wrapper to match your system installation. +


+ -

Security Model of suEXEC

+

Security Model of suEXEC

The suEXEC wrapper supplied with Apache performs the following security checks before it will execute any program passed to it for execution.
    @@ -124,7 +128,9 @@ If any of these issues are too restrictive, or do not seem restrictive enough, y welcome to install your own version of the wrapper. We've given you the rope, now go have fun with it. :-) -

    Using suEXEC

    +
    + +

    Using suEXEC

    After properly installing the suexec wrapper executable, you must kill and restart the Apache server. A simple kill -1 `cat httpd.pid` will not be enough. Upon startup of the webserver, if Apache finds a properly configured suexec wrapper, @@ -146,7 +152,9 @@ is being directed. This is accomplished by using the ~ character prefixin user id for whom execution is desired. The only requirement needed for this feature to work is for CGI execution to be enabled for the user and that the script must meet the scrutiny of the security checks above. -

    Debugging suEXEC

    +
    + +

    Debugging suEXEC

    The suEXEC wrapper will write log information to the location defined in the suexec.h as indicated above. If you feel you have configured and installed the wrapper properly, have a look at this log and the error_log for the server to see where you may have gone astray. diff --git a/docs/manual/suexec.html.en b/docs/manual/suexec.html.en index 5c0ebef684..8ce9a7b6f2 100644 --- a/docs/manual/suexec.html.en +++ b/docs/manual/suexec.html.en @@ -3,11 +3,11 @@ -

    Apache SetUserID Support

    +

    Apache suEXEC Support


    -

    What is suEXEC?

    +

    What is suEXEC?

    The suEXEC feature, introduced in Apache 1.2 provides the ability to run CGI programs under user ids different from the user id of the calling webserver. Used properly, this feature can reduce considerably the @@ -17,7 +17,9 @@ steal all the money from your retirement fund. :-) If you aren't familar with managing setuid root programs and the security issues they present, we highly recommend that you not consider using this feature.

    -

    Enabling suEXEC Support

    +
    + +

    Enabling suEXEC Support

    Having said all that, enabling this feature is purposefully difficult with the intent that it will only be installed by users determined to use it and is not part of the normal install/compile process.

    @@ -101,8 +103,10 @@ commands.

    Change the path to the suEXEC wrapper to match your system installation. +


    + -

    Security Model of suEXEC

    +

    Security Model of suEXEC

    The suEXEC wrapper supplied with Apache performs the following security checks before it will execute any program passed to it for execution.
      @@ -124,7 +128,9 @@ If any of these issues are too restrictive, or do not seem restrictive enough, y welcome to install your own version of the wrapper. We've given you the rope, now go have fun with it. :-) -

      Using suEXEC

      +
      + +

      Using suEXEC

      After properly installing the suexec wrapper executable, you must kill and restart the Apache server. A simple kill -1 `cat httpd.pid` will not be enough. Upon startup of the webserver, if Apache finds a properly configured suexec wrapper, @@ -146,7 +152,9 @@ is being directed. This is accomplished by using the ~ character prefixin user id for whom execution is desired. The only requirement needed for this feature to work is for CGI execution to be enabled for the user and that the script must meet the scrutiny of the security checks above. -

      Debugging suEXEC

      +
      + +

      Debugging suEXEC

      The suEXEC wrapper will write log information to the location defined in the suexec.h as indicated above. If you feel you have configured and installed the wrapper properly, have a look at this log and the error_log for the server to see where you may have gone astray.