On Fri, 12.03.2010 at 13:28:07 -0700, kj...@pintday.org <kj...@pintday.org> 
wrote:
> > Very good suggestion, indeed.

-20

I'm impartial, though, as I don't use the default configuration,
anyway. I think it's rather a non-issue.

> > Especially, if someone has a 'dangerous' file, a PHP Shell for instance,
> > (a perfect example: 
> > http://mgeisler.net/downloads/phpshell/phpshell-1.7.tar.gz)
> > inside such a directory. (Or even maybe a simple file uploader, that will 
> > help the attacker to upload such 'shell-over-http' files.)
> 
> Also, think "emacs-turdfile". Have any config.php~ lying around?
> 
> or index.php~?
> 
> Are you SURE?

Yes, I am SURE.

Reason: Whoever directly edits files in his or her web tree, is begging
for trouble, anyway (imho), eg. resulting in famous websites telling me
highly interesting stories like: "/var/www/some/stinking.php: could not
contact mysql at bogusserver" (in the less-dangerous cases).

I'd say that you generally need a 'development' server, no matter what,
where you can have version control, build scripts etc.pp, and a
Makefile that has an appropriate target for deployment, so you can go
into your development area and say 'make' to put your latest version of
anything online. Without cruft, recording a known (good?) state along
the way, and a way to undo all of this, or prove to third parties that
something was or was not online at some point in time.

Having a development server can be as cheap as a virtual host with
"different" access restrictions, which points to a different directory,
out of reach for the regular web server, so there is really no reason
for not having it.


Btw, the case with emacs-turdfiles could also be solved by providing a
suitable IndexIgnore statement in the configuration.


Kind regards,
--Toni++

Reply via email to