Server Configuration - Basic Security Part 7
NB: This is the seventh post in a series of posts on web application security.
Configuring a server correctly is both 1) hard and 2) critical.
You’ve probably spent a bunch of time configuring Apache or nginx, or whatever your server of choice is, for performance. But have you configured it for security?
I can’t tell you exactly what to do without knowing your set up, but some basics:
- Are directories only writeable by the web
- Do all of them even need to be? Are you sure?
- Can the web process write to its own source files?
- Are any
ScriptAliasdirectives set you don’t know about?
- Are your firewall rules restrictive enough?
- There is literally so much more. Contract a good sysadmin.
- Is PHP installed on your Python server?
1: See Valentin’s comment about running server and application(s) as separate users. He’s right.
Let me elaborate on the last one, because our security team will let me. We had left PHP installed (part of our puppet configs) on app servers that were only going to run Python. Someone discovered a small hole—we weren’t checking the extensions of uploaded images—and realized they could upload PHP scripts, and the Apache server, happily serving “static” files, interpreted and ran them.
Don’t do that. Learn from us on that one. Double check. Then check again.
Those of you who’ve configured servers, webdevs, devops, sysadmins, what are other key things to check to make sure you’ve hardened your server configuration?
- Go to the series index.
- Go to the previous post in the series, Session Fixation and Hijacking.
- Go to the next post in the series, Click-Jacking and a little Phishing.