Re: security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 13 Aug 2010 09:30:58 +0200, Tim <ignored_mailbox@xxxxxxxxxxxx>  
wrote:

> On Thu, 2010-08-12 at 16:44 +0200, roland wrote:
>> Someone who will install a website on the server. So I thought to give
>> him a login and config apache to read the dir in his home dir.
>> He has to upload the files for this site. So I won't him to see only
>> his home dir.
>
> So, if someone else is going to install the serving software, they'll
> only need to be able to upload files to their workspace, not needing
> full access to the computer.  Though they might, to configure the
> server.  It depends on whether you provide them with an interface for
> that, or direct access.
>
> Moderately risky, more so if you let them install scripts, even more so
> if it can send emails.  But not too hard to secure something like that.
> You want to learn what the common exploits are, so you can understand
> securing it, and competently test that you've succeeded.
>
> Lots of web hosts around the planet do something similar.  Run Apache on
> some Linux or Unix, give their customers FTP access (or another file
> transfer scheme) to upload their pages, and use something like CPanel to
> let them customise their use of the webserver.
>

Of course, if one cannot restrict the access, FTP will be still insecure.
So first I will try what 'Kalinix' said, and install chroot.

Thanks to you and all the others for your time.
-- 

Roland



-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux