From: Nilgun Belma Buguner
Used properly, this feature can reduce @@ -115,7 +115,7 @@
This is to ensure that the user executing the wrapper is @@ -125,7 +125,7 @@
The wrapper will only execute if it is given the proper @@ -139,7 +139,7 @@
Is this user the user allowed to run this wrapper? Only @@ -150,7 +150,7 @@
Does the target CGI or SSI program's path contain a leading @@ -162,7 +162,7 @@
Does the target user exist? @@ -170,7 +170,7 @@
Does the target group exist? @@ -189,7 +189,7 @@
The minimum user ID number is specified during @@ -201,7 +201,7 @@
Presently, suEXEC does not allow the root
@@ -211,7 +211,7 @@
The minimum group ID number is specified during @@ -223,7 +223,7 @@
Here is where the program becomes the target user and @@ -245,12 +245,13 @@
If the request is for a regular portion of the server, is
the requested directory within suEXEC's document root? If
- the request is for a UserDir, is the requested directory
+ the request is for a
We don't want to open up the directory to others; only @@ -268,7 +269,7 @@
If it doesn't exists, it can't very well be executed. @@ -277,7 +278,7 @@
We don't want to give anyone other than the owner the @@ -287,7 +288,7 @@
We do not want to execute programs that will then change @@ -297,7 +298,7 @@
Is the user the owner of the file? @@ -306,7 +307,7 @@
suEXEC cleans the process' environment by establishing a @@ -319,7 +320,7 @@
Here is where suEXEC ends and the target CGI/SSI program begins.
@@ -378,13 +379,15 @@
directories where suEXEC access should be allowed. All
executables under this directory will be executable by suEXEC
as the user so they should be "safe" programs. If you are
- using a "simple" UserDir directive (ie. one without a "*" in
- it) this should be set to the same value. suEXEC will not
- work properly in cases where the UserDir directive points to
+ using a "simple" Compiling and installing the suEXEC
- wrapper Setting paranoid permissions If for example, your web-server is configured to run as: and This will ensure that only the group Apache runs as can even
- execute the suEXEC wrapper. If you have enabled the suEXEC feature with the
+ After all components have been built you can execute the
+ command Please note that you need root
+ privileges for the installation step. In order
+ for the wrapper to set the user ID, it must be installed as
+ owner Although the suEXEC wrapper will check to ensure that its
+ caller is the correct user as specified with the
+ If for example, your web server is configured to run as: and This will ensure that only the group Apache runs as can even
+ execute the suEXEC wrapper.
For security and efficiency reasons, all suEXEC requests
@@ -571,7 +583,7 @@
This can be a dangerous thing to change. Make certain
@@ -583,7 +595,7 @@
Again, this can cause Big Trouble if you
- If you have virtual hosts with a different UserDir for each,
+ as referenced in the passwd
file. Default value is
+ "public_html
".
+ If you have virtual hosts with a different --with-suexec-docroot=DIR
--datadir
- value with the suffix "/htdocs", e.g. if you configure
- with "--datadir=/home/apache
" the directory
- "/home/apache/htdocs" is used as document root for the suEXEC
- wrapper.--datadir
value with the suffix
+ "/htdocs
", e.g. if you configure with
+ "--datadir=/home/apache
" the directory
+ "/home/apache/htdocs
" is used as document root for the
+ suEXEC wrapper.
--with-suexec-uidmin=UID
--logfiledir
).suexec_log
" and located in your standard logfile
+ directory (--logfiledir
).
--with-suexec-safepath=PATH
/usr/local/bin:/usr/bin:/bin
".
-
- If you have enabled the suEXEC feature with the
- --enable-suexec
option the suexec
binary
- (together with Apache itself) is automatically built if you execute
- the make
command.
- After all components have been built you can execute the
- command make install
to install them. The binary image
- suexec
is installed in the directory defined by the
- --sbindir
option. The default location is
- "/usr/local/apache2/bin/suexec".
- Please note that you need root
- privileges for the installation step. In order
- for the wrapper to set the user ID, it must be installed as
- owner root
and must have the setuserid
- execution bit set for file modes.
- Although the suEXEC wrapper will check to ensure that its
- caller is the correct user as specified with the
- --with-suexec-caller
- Group webgroup
-
- chmod 4750 /usr/local/apache2/bin/suexec
---enable-suexec
option the suexec
binary
+ (together with Apache itself) is automatically built if you execute
+ the make
command.make install
to install them. The binary image
+ suexec
is installed in the directory defined by the
+ --sbindir
option. The default location is
+ "/usr/local/apache2/bin/suexec".root
and must have the setuserid
+ execution bit set for file modes.--with-suexec-caller
+ Group webgroup
+
+ chmod 4750 /usr/local/apache2/bin/suexec
+