summaryrefslogtreecommitdiff
path: root/docs/manual/mod/mod_privileges.xml
diff options
context:
space:
mode:
authorNick Kew <niq@apache.org>2009-05-05 14:08:31 +0000
committerNick Kew <niq@apache.org>2009-05-05 14:08:31 +0000
commit3775c02540f2ca8376194bd44498547e494bb8d7 (patch)
treee830f671bfd5993bce4cac19023631ac76ea5735 /docs/manual/mod/mod_privileges.xml
parent3111b393e40189fa20f659bab6f45a7df4d0cbd1 (diff)
downloadhttpd-3775c02540f2ca8376194bd44498547e494bb8d7.tar.gz
Documentation update for mod_privileges changes in r771144/771145.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@771733 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'docs/manual/mod/mod_privileges.xml')
-rw-r--r--docs/manual/mod/mod_privileges.xml164
1 files changed, 89 insertions, 75 deletions
diff --git a/docs/manual/mod/mod_privileges.xml b/docs/manual/mod/mod_privileges.xml
index 3054a89a6e..d9873dbb95 100644
--- a/docs/manual/mod/mod_privileges.xml
+++ b/docs/manual/mod/mod_privileges.xml
@@ -59,91 +59,105 @@ separation is an issue.</p>
</summary>
<section id="security"><title>Security Considerations</title>
-<p>There are three principal security concerns with mod_privileges:</p>
+
+<p><module>mod_privileges</module> introduces new security concerns
+in situations where <strong>untrusted code</strong> may be run
+<strong>within the webserver process</strong>. This applies to
+untrusted modules, and scripts running under modules such as
+mod_php or mod_perl. Scripts running externally (e.g. as CGI
+or in an appserver behind mod_proxy or mod_jk) are NOT affected.</p>
+
+<p>The basic security concerns with mod_privileges are:</p>
<ul><li>Running as a system user introduces the same security issues
as mod_suexec, and near-equivalents such as cgiwrap and suphp.</li>
<li>A privileges-aware malicious user extension (module or script)
could escalate its privileges to anything available to the
- httpd process in any virtual host.</li>
+ httpd process in any virtual host. This introduces new risks
+ if (and only if) mod_privileges is compiled with the
+ <var>BIG_SECURITY_HOLE</var> option.</li>
<li>A privileges-aware malicious user extension (module or script)
- could escalate privileges to set its user ID to another
- system user (and/or group).</li>
-</ul>
-
-<p>The first is amply discussed in the suexec page and elsewhere, and
-doesn't need repeating here. The second and third boil down to one
-principle: ensure no untrusted privileges-aware code can be loaded.
-</p>
-
-<p>There are several ways privileges-aware code could be loaded into Apache:</p>
-<ul>
-<li>within the base system (e.g. mod_privileges itself if statically linked).</li>
-<li>Loaded at startup using a LoadModule or LoadFile directive.</li>
-<li>Loaded at startup indirectly by an application module such as mod_php.</li>
-<li>Loaded at runtime by an application module or script.</li>
+ could escalate privileges to set its user ID to another system
+ user (and/or group).</li>
</ul>
-<p>What gets loaded at startup is under the control of the sysop, and
-relatively easy to deal with. A tool will be provided to audit your
-installation. That leaves code loaded in the course of processing a
-request as the threat. There is unfortunately no generic way apache
-can control what a script running under an application module can load,
-so you should use the security provided by your scripting module
-and language.</p>
-
-<section><title>Security with mod_php</title>
-
-<p>There is no known PHP extension supporting Solaris privileges, so it
-is unlikely that a script could escalate privileges unless it can
-load external (non-PHP) privileges-aware code. However, you should
-nevertheless audit your mod_php installation.</p>
-
-<p>To prevent scripts loading privileges-aware code, PHP's dl() function
-should be disabled. This is automatic in safe mode.</p>
-
-</section>
-
-<section><title>Security with mod_perl</title>
-
-<p>Perl has an extension Sun::Solaris::Privileges that exposes the privileges
-API to scripts. You should ensure this extension is NOT installed if you
-have untrusted users.</p>
-
-<p>You will also need to ensure that your users cannot load shared objects
-(including PerlXS) from their own user directories, or that if this is
-enabled, the entire user-space must be carefully audited.</p>
-</section>
-
-<section><title>Security with mod_python</title>
+<p>The <directive>PrivilegesMode</directive> directive allows you to
+select either <var>FAST</var> or <var>SECURE</var> mode. You can
+mix modes, using <var>FAST</var> mode for trusted users and
+fully-audited code paths, while imposing SECURE mode where an
+untrusted user has scope to introduce code.</p>
+<p>Before describing the modes, we should also introduce the target
+use cases: Benign vs Hostile. In a benign situation, you want to
+separate users for their convenience, and protect them and the server
+against the risks posed by honest mistakes, but you trust your users
+are not deliberately subverting system security. In a hostile
+situation - e.g. commercial hosting - you may have users deliberately
+attacking the system or each other.</p>
+<dl>
+<dt>FAST mode</dt>
+<dd>In <var>FAST</var> mode, requests are run in-process with the
+selected uid/gid and privileges, so the overhead is negligible.
+This is suitable for benign situations, but is not secure against an
+attacker escalating privileges with an in-process module or script.</dd>
+<dt>SECURE mode</dt>
+<dd>A request in <var>SECURE</var> mode forks a subprocess, which
+then drops privileges. This is a very similar case to running CGI
+with suexec, but for the entire request cycle, and with the benefit
+of fine-grained control of privileges.</dd>
+</dl>
+<p>You can select different <directive>PrivilegesMode</directive>s for
+each virtual host, and even in a directory context within a virtual
+host. <var>FAST</var> mode is appropriate where the user(s) are
+trusted and/or have no privilege to load in-process code.
+<var>SECURE</var> mode is appropriate to cases where untrusted code
+might be run in-process. However, even in <var>SECURE</var> mode,
+there is no protection against a malicious user who is able to
+introduce privileges-aware code running <em>before the start of the
+request-processing cycle.</em></p>
-<p>There is no known Python extension supporting Solaris privileges, so it
-is unlikely that a script could escalate privileges unless it can
-load external (non-Python) privileges-aware code. However, you should
-nevertheless audit your mod_python installation.</p>
-
-<p>*** What are the issues of Python loading a shared object?</p>
</section>
+<directivesynopsis>
+<name>PrivilegesMode</name>
+<description>Trade off processing speed and efficiency vs security against
+malicious privileges-aware code.</description>
+<syntax>PrivilegesMode FAST|SECURE|SELECTIVE</syntax>
+<contextlist>
+ <context>server config</context>
+ <context>virtual host</context>
+ <context>directory</context>
+</contextlist>
+<compatibility>Available on Solaris 10 and OpenSolaris with
+non-threaded MPMs (<module>prefork</module> or custom MPM).</compatibility>
+<usage><p>This directive trades off performance vs security against
+malicious, privileges-aware code. In <var>SECURE</var> mode, each request
+runs in a secure subprocess, incurring a substantial performance penalty.
+In <var>FAST</var> mode, the server is not protected against escalation
+of privileges as discussed above.</p>
+<p>This directive differs slightly between a <code>&lt;Directory&gt;</code>
+ context (including equivalents such as Location/Files/If) and a
+ top-level or <code>&lt;VirtualHost&gt;</code>.</p>
+<p>At top-level, it sets a default that will be inherited by virtualhosts.
+ In a virtual host, FAST or SECURE mode acts on the entire
+ HTTP request, and any settings in a <code>&lt;Directory&gt;</code>
+ context will be <strong>ignored</strong>. A third pseudo-mode
+ SELECTIVE defers the choice of FAST vs SECURE to directives in a
+ <code>&lt;Directory&gt;</code> context.</p>
+<p>In a <code>&lt;Directory&gt;</code> context, it is applicable only
+ where SELECTIVE mode was set for the VirtualHost. Only
+ FAST or SECURE can be set in this context (SELECTIVE would be
+meaningless).</p>
+<note type="warning"><title>Warning</title>
+ Where SELECTIVE mode is selected for a virtual host, the activation
+ of privileges must be deferred until <em>after</em> the mapping
+ phase of request processing has determined what
+ <code>&lt;Directory&gt;</code> context applies to the request.
+ This might give an attacker opportunities to introduce
+ code through a <directive module="mod_rewrite">RewriteMap</directive>
+ running at top-level or <code>&lt;VirtualHost&gt;</code> context
+ <em>before</em> privileges have been dropped and userid/gid set.
+</note>
+</usage>
+</directivesynopsis>
-<section><title>Security with mod_ruby</title>
-
-<p>There is no known Ruby extension supporting Solaris privileges, so it
-is unlikely that a script could escalate privileges unless it can
-load external (non-Ruby) privileges-aware code. However, you should
-nevertheless audit your mod_ruby installation.</p>
-
-<p>*** What are the issues of Ruby loading a shared object?</p>
-</section>
-
-<section><title>Security with Lua/mod_wombat</title>
-
-<p>???</p>
-</section>
-<section><title>Security with scripts</title>
-<p>The security issues of mod_privileges do not affect scripts such as
-traditional CGI, which run in a separate process. That includes
-PHP, Perl, Python, Ruby, etc, run out-of-process.</p>
-</section>
-</section>
<directivesynopsis>
<name>VHostUser</name>
<description>Sets the User ID under which a virtual host runs.</description>