Apache Week
   
   Issue 197, 5th May 2000:  

Copyright 1996-2005
Red Hat, Inc.

In this issue


Apache.org defaced; Apache web server not to blame

The apache.org site received a slight, unauthorised, redesign this week after the machine hosting it was victim to an attack. This was made possible due to a number of misconfigured non-related services on the machine and not due to a security hole within the Apache web server itself.

There seems to have been no malicious intent as the only damage was the addition of a mildly ironic "Powered by Microsoft BackOffice" logo to the front page. Those of you who missed it the first time can see it in all its glory on the the attrition mirror. The group responible gave full information of what they had done and how they managed to do it.

Brian Behlendorf, in a message to Apache developers, commented "I think it can be said that this compromise was mostly due to a lack of discipline on the part of those who had root and set up services without considering the ramifications of the way they were installed ... the policy of giving root access to a larger number of people than usual was probably a mistake."

Here are a few simple steps to ensure that your site isn't vulnerable to a similar attack

  • Make sure that the files in your document root are owned by a different user to the one the web server is running as. So if your web server is running as user 'www' make sure your files are not owned by 'www'. This ensures that if someone is able to find a security flaw in the server or your scripts they will not be able to directly alter the contents of your site, making it harder for them to gain access by running trojan programs
  • Don't share your web server document root with your ftp directory. ftp servers are notoriously difficult to configure securely and attackers may be able to take advantage of security flaws in ftp to write files into your web directory that they can execute at will
  • If your site runs the PHP scripting language then consider turning on "safe-mode". This will prevent attackers who are able to upload pages executing arbitrary commands.
  • Audit any scripts you run on your server, paying particular attention to scripts that read and return files based on data passed in the URL or from a form. Without correct checking users could pass in filenames containing "../" sections and potentially read arbitrary files on your system.
  • Where possible only allow users who fully understand the security risks to run CGI or other scripts on your server

The Apache site was unavailable for a period of time on Thursday due to an unrelated problem with the machine hardware. FTP access to the Apache site is unlikely to be restored, and the Apache bug databases are temporarily disabled pending a security audit.


In the news

ZDNet benchmarks Apache

ZDNet examine web server platforms in their article, "Picking the Right Server is Key". They compare Windows 2000 Advanced Server, Netware 5.1, Red Hat Linux using Apache, Solaris using iPlanet, and Solaris using Apache. Their conclusion was the Linux/Apache approach was measurably slower at serving up static HTML but commendably fast at executing CGI scripts. However their benchmark results show that there is little performance difference at all until the server gets to around 1,000 static requests per second.

So if you're running a site on one machine, are expecting over 86 million hits a day, and have the bandwidth to be able to fulfill them, this may be an issue. If you're in that situation, we suggest investing in a few more servers (the more flashy lights the better) and some load balancing hardware as the additional cost outweighs the cost you'll be paying for the bandwidth anyway. We'd also like a shell account on that box, please.

E-Soft survey gives interesting statistics

If you are a regular reader of Apache Week you'll know that Apache has been the top web server in all the probe-based web surveys for some time, now with over 60% market share. The April survey from E-Soft also gives some other interesting statistics for modules in use; the most popular being the PHP scripting language in use on 29% of Apache sites. In the secure server space, Apache still leads with 34% of the market with Stronghold (also based on Apache) in second place at 31% giving a combined total of nearly two thirds market share.

Of particular note is the number of sites running older copies of Apache. Nearly 19% of Apache sites are still running versions of Apache 1.2 even though the last 1.2 release was over two years ago in February 1998. Only 6% of Apache sites are running the latest version, Apache 1.3.12 leaving the other 94% of sites potentially vulnerable to the cross-site scripting attack.


Featured Articles

The Developer Shed have released an overview of session management for PHP in their article, "Couch Sessions". The article takes a look at tracking users using session management and explains how it can be easily acomplished with PHP4 and PHP3.


Apache-related jobs

This occasional section contains short announcements of jobs which require significant Apache experience. To see more jobs or find out how to submit your vacancy visit the Apache Week Jobs section.

Software Designer (Boulder, Colorado)
bivio is seeking software designers skilled in building ultra-reliable, reusable, high-performance transaction processing systems using Apache, mod_perl, Oracle on Linux. Benefits: salary, equity, relocation, four weeks vacation, and portions of work releasable as freeware. Qualifications: problem solver, egoless programmer, and can take on extreme responsibility.
web developer (Bath, England)
To work on a range of commercial projects related to the Netcraft Web Server Survey, including web content technologies,

Apache status

Apache Site: www.apache.org/httpd
Release: 1.3.12 (Released 25th February 2000) (local download sites)
Beta: None
Alpha: 2.0a3 (Released 28th April 2000) (local download sites)

Apache 1.3.12 is the current stable release. Users of Apache 1.3.11 and earlier on Unix and Windows systems should upgrade to this version. Read the Guide to 1.3.12, the Guide to 1.3.11 for information about changes between 1.3.9 and 1.3.11 and the Guide to 1.3.9 for information about changes between 1.3.6 and 1.3.9.


Third Apache 2.0 alpha available

A series of alpha releases of Apache 2.0 are being made available from the Apache site. This alpha has a number of additions and fixes since the second alpha released at the end of March but should still not be considered even beta-quality code. The release of the third alpha was covered in Linux Today and slashdot.


Need help with Apache?

Every day at Apache Week we receive many requests to help with individual Apache problems. Whilst we can't respond to every request we are interested to hear about particular problems you are having with Apache so that we can write about the things that more commonly occur. We are equally interested in any success stories you might want to share, how you came across pit falls and what you did to solve them. Mail the editors at editors@apacheweek.com.

The O'Reilly Network recently started an Apache forum where users can request help and talk about their experiences with Apache.


Comments or criticisms? Please email us at editors@apacheweek.com