Source: apache2-suexec-custom
Severity: wishlist

Hi.

To my mind, suexec in general is somewhat security flawed, as it allows
to su to any UID/GID above the minium value for those (currently 100 in Debian).

This is required when using it with the userdir feature, as a site may have
many users with there own scripts...

But for many setups, you want to do just some prviliege separation, e.g. that
your forum runs as user myforum and your CalDAV server runs as mycalendar.

An even in the userdir example,.. you perhaps want to restric suexec itself
to only some trustworthy users.


Now we already have a custom version of suexec.
I propose to add further changes:
- the 3rd line should be allowed to give a list of UIDs, separated by ","
- the 4th line should be allowed to give a list of GIDs, separated by ","

If set,.. suexec will only switch to the respective UIDs/GIDs.
UIDs/GIDs below AP_UID_MIN/AP_GID_MIN shall still be ignored.
If unset,.. the usual AP_UID_MIN/AP_GID_MIN restriction applies.

A comfortable version could allow seting user/group names, that are then
resolved.
Care must be taken that AFTER resolving,.. and UIDs/GIDs below 
AP_UID_MIN/AP_GID_MIN
are ignored.


I'd also suggest to take the opportunity and improve the configuration file
schema.
Setting the options based on their line numer is just to error prone.
Something like this would be better IMHO:
document_root = foobar
userdir_suffix = foobar
allowed_users = 2000,2050,mycalendar
allowed_groups = 3000,4040,mycalendarGroup



Cheers,
Chris.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to