Le jeudi 18 août 2011 à 11:37:48 (+0200 CEST), mahashakt...@orange.fr a écrit : > Package: dspam-webfrontend > Version: 3.10.1+dfsg-2 > Severity: normal > Tags: sid > > Hi, > > Installing the dspam-webfrontend package make it impossible to access to > the web interface of other apache2 depending packages like backuppc or > dpkg-www which were running O.K. before. For theses packages I get an > Internal Server error , Error 500. Looking in /var/log/apache2/suexec.log > gives following error message : > > [2011-08-18 11:30:13]: uid: (110/dspam) gid: (113/dspam) cmd: index.cgi > [2011-08-18 11:30:13]: command not in docroot > (/usr/share/backuppc/cgi-bin/index.cgi) > [2011-08-18 11:30:39]: uid: (110/dspam) gid: (113/dspam) cmd: dpkg > [2011-08-18 11:30:39]: command not in docroot (/usr/lib/cgi-bin/dpkg) > > The only way I found till then was to comment out the SuexecUserGroup > line in /etc/apache2/conf.d/dspam.conf but ... it is not a solution .
The SuexecUserGroup directive should indeed be located in a VirtualHost block to restrict its effect to this virtual host. Would you please test the attached apache configuration snippet and tell me what you think of it? It creates a virtual host listening on port 8024, only reachable from the local machine. Cheers, Julien -- .''`. Julien Valroff ~ <jul...@kirya.net> ~ <jul...@debian.org> : :' : Debian Developer & Free software contributor `. `'` http://www.kirya.net/ `- 4096R/ E1D8 5796 8214 4687 E416 948C 859F EF67 258E 26B1
# Dspam example website configuration for Apache 2 # # Use htpasswd to create /etc/dspam/passwd and add a system username. # The password should not be the same as the user's system password. # # htpasswd -c /etc/dspam/passwd <username> # # chown root.www-data /etc/dspam/passwd && chmod 640 /etc/dspam/passwd # # Make sure the suexec module is installed and loaded: # # apt-get install apache2-suexec # # a2enmod suexec # # Install this file in Apache configuration directory: # # cp /usr/share/doc/dspam-webfrontend/examples/apache2.conf \ # /etc/apache2/conf.d/dspam # # Then visit http://127.0.0.1:8024 and log in. # # Add the admin username to /etc/dspam/admins, which will enable the # 'Administrative Suite' tab and functionality for that person. Listen 8024 <Directory /var/www/dspam/> # This makes the /dspam directory unavailable from the default virtual host Order deny,allow Deny from all </Directory> <VirtualHost *:8024> DocumentRoot /var/www/dspam/ SuexecUserGroup dspam dspam Alias /usr/share/dspam /usr/share/dspam/ <Directory /var/www/dspam/> Addhandler cgi-script .cgi DirectoryIndex dspam.cgi Options +ExecCGI +MultiViews -Indexes AllowOverride None Order deny,allow Deny from all # This makes the DSPAM WebUI only available from the local machine # You may obviously want to add other IP adresses (local network etc.) # to the following line Allow from 127.0.0.0/255.0.0.0 ::1/128 AuthType Basic AuthName "DSPAM Control Center" AuthUserFile /etc/dspam/passwd Require valid-user </Directory> <Directory /usr/share/dspam/> Options -Indexes AllowOverride None </Directory> </VirtualHost> # The above configuration is provided only as an example. For serious work # over the internet, it should be set up as a proper VirtualHost and SSL # should be used to protect the user's credentials. If the site has many # users, consider using one of the db-based authentication methods, # e.g. mod_auth_mysql.