• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 232
  • Last Modified:

Big problem

Hi Experts,

I accidentally found that when open site as http://myip/  without directory and page name it opens up my root and all directories under it :))) BTW it is our production server that I did not setup...some guy did :))) So the question is how to make sure that it will be protected in the future ? For any directory of course.

Thank you.
0
fpoyavo
Asked:
fpoyavo
  • 9
  • 3
  • 2
  • +2
1 Solution
 
owensleftfootCommented:
That is a major screwup. You probably need to change the DocumentRoot option in /etc/httpd.conf
However, even  if you change the documentroot option, the user apache (I assume you are using apache?) is run as still shouldnt have access to your /root directory.
0
 
Alf666Commented:
Owens,

I think that this person mentions "/" when he says root, and not "/root".

It looks like the person wh did the setup added some virtual hosts, and screwed up the default site setup.
Owens is right. Just change the DocumentRoot directive to any place where there's nothing.
Also do the same with the cgi-bin dir if it's aliased.

0
 
fpoyavoAuthor Commented:
Yep. It is not / it is root of tomcat / appache.
0
Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

 
fpoyavoAuthor Commented:
Hm....DocumentRoot is already pointing to place where not much to look at.

What else I could check ?
0
 
owensleftfootCommented:
"DocumentRoot is already pointing to place where not much to look at."

Where is it pointing to?
0
 
fpoyavoAuthor Commented:
TO opt/myapplication/www
0
 
fpoyavoAuthor Commented:
Correction,

The only directories and files that are in danger when you do :

http://myip:8080/sample/ 

here myapp located in opt/myapplication/tomcat/webapps/sample

Thank you.
0
 
willy134Commented:
for a quick starters put an index.html in your root directory.  It can be empty

touch index.html

That will block quite a bit of accidental use.
0
 
fpoyavoAuthor Commented:
What about when somebody attempts to run crawler against my server ? Is there way to make site protected ?
0
 
fpoyavoAuthor Commented:
willy134,

You were right but I had to place this index.html in every folder of of application. Is there way to make it easier ?

Thank you.
0
 
fpoyavoAuthor Commented:
Another surprise I have found today...:))) o Man I used a free tool to make site mirroring (they call it so) ....basically you can point it to any IP and get everything
and more from there if it is not properly protected. Just for fun I have pointed to our production site...O yeeee I have gotten code, files and my manager's personal record :))))) too

Guys just tell me is there any way to make me sleep in peace tonigth and ooo well this Server boy ?

Thank you.
0
 
owensleftfootCommented:
0
 
stefan73Commented:
Hi fpoyavo,
> I have gotten code, files and my manager's personal record :)))))

Not good at all. Even if you prohibit directory listings (as most comments suggest), this is security by obscurity only. NEVER, EVER rely on this.

Check that your web server is password protected (see http://httpd.apache.org/docs/howto/auth.html).

Re-think your architecture approach. A web server alone is not a suitable place to store confident information. When you can read your boss' record, anyone else can.

Cheers,
Stefan
0
 
stefan73Commented:
Use explicit permissions based on IPs in your .htaccess file (Beware: IPs can be spoofed!):

order allow,deny
allow from 123.45.6.7
allow from 012.34.5.
deny from all

0
 
fpoyavoAuthor Commented:
stefan73,

I have tried to set password file, create .htaccess but it is still not protected :((  I have used link from apache site and did step by step
restarted Apache and nothing ....I can still access everything everywhere without password ????

May be I am missing some point ?

Thank you.
0
 
willy134Commented:
I did realize that adding the index.html files would not lead to total absoultion but it is a quick way to deter small peeping toms.

What does your httpd.conf look like?  You should be able to easily move the root location to somewhere else.  Are you sure it is reading the right httpd.conf?  Can you look at the logs and verify this?  I haven't read my logs for a while but it might state where it reads its config.

/var/log/httpd
Look at the init script does it point to a different httpd conf?
/etc/init.d/httpd

does it have a httpd2.conf....
0
 
fpoyavoAuthor Commented:
The conf file could be found in : http://www.experts-exchange.com/Security/Linux_Security/Q_20955960.html

I was looking into /var/log/httpd ------- DOES NOT EXISTS
                          /etc/init.d/httpd ----- DOES NOT EXISTS

Is it good or bad ?
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

  • 9
  • 3
  • 2
  • +2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now