03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

►<br />

►<br />

►<br />

►<br />

Running daemon as root: when the HTTPD daemon starts, it uses the root<br />

account. Then it initializes a number of threads that actually serve end-user<br />

requests. These threads are managed by the root's controller thread and are<br />

not responsible for administration and control procedures. The StartServer<br />

directive of the httpd.conf file sets the users and groups that own running Web<br />

server process. You have to set these directives to the users and groups that<br />

you define to run a Web server. Never run Web server as the root user.<br />

Digest authentication: basic authentication does not secure user passwords<br />

that are passed from the Web browser to the server in plain text. In order to<br />

encrypt or encode a password, some servers have additional modules that<br />

can implement MD5 encoding. Both your server and your browser should<br />

support MD5 digest authentication. In digest authentication, the password is<br />

not sent across the network. On a client side, the Web browser creates an<br />

MD5 encoded string using the user password and AuthRealm. The Web<br />

server creates its own string based on the information stored in the httpd.conf<br />

file and compares it with the information sent by the client's browser.<br />

Kerberos authentication: Kerberos is a third party authentication system<br />

which allows secure authentication and communication of clients and servers<br />

over the network. It uses DES algorithm for encryption. Refer to your Web<br />

server documentation for required modules in order to run Kerberos system.<br />

Chroot: many operating systems offer the chroot command that tells the<br />

application to treat a given directory as if it were a root directory. This allows<br />

hiding the file system that is above that directory from every process of the<br />

executing application. One drawback to using the chroot command is that all<br />

the executable code and modules used by the application should be placed<br />

within the directory that is visible to the application.<br />

There are many other possible security options that may be used in your<br />

solution. Everything is highly dependent on the selected architecture and<br />

application requirements.<br />

Chapter 4. Securing Web components 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!