When ran against default OpenBSD servers that have Apache enabled,
vulnerability assessment software (Nessus, Rapid7, etc.) complain about
"browesable web directories". The concern is that someone may
accidentally place inappropriate files in the web directories that will
then be visible to others. Would it be a good idea to remove the Indexes
option from httpd.conf? Admins may enable the option later if they like:

# cvs diff -Nup httpd.conf  
Index: httpd.conf
===================================================================
RCS file: /cvs/src/usr.sbin/httpd/conf/httpd.conf,v
retrieving revision 1.26
diff -N -u -p httpd.conf
--- httpd.conf  3 Jun 2009 18:28:21 -0000       1.26
+++ httpd.conf  12 Mar 2010 17:39:06 -0000
@@ -396,7 +396,7 @@ DocumentRoot "/var/www/htdocs"
 # Note that "MultiViews" must be named *explicitly* --- "Options All"
 # doesn't give it to you.
 #
-    Options Indexes FollowSymLinks
+    Options FollowSymLinks
 
 #
 # This controls which options the .htaccess files in directories can
@@ -601,7 +601,7 @@ CustomLog logs/access_log common
 Alias /icons/ "/var/www/icons/"
 
 <Directory "/var/www/icons">
-    Options Indexes MultiViews
+    Options MultiViews
     AllowOverride None
     Order allow,deny
     Allow from all

Reply via email to