Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 24762 invoked from network); 16 Nov 2009 14:19:15 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 16 Nov 2009 14:19:15 -0000 Received: (qmail 54994 invoked by uid 500); 16 Nov 2009 14:19:14 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 54923 invoked by uid 500); 16 Nov 2009 14:19:14 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 54914 invoked by uid 99); 16 Nov 2009 14:19:14 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 16 Nov 2009 14:19:14 +0000 X-ASF-Spam-Status: No, hits=-2.6 required=5.0 tests=AWL,BAYES_00 X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of m.watts@eris.qinetiq.com designates 128.98.1.9 as permitted sender) Received: from [128.98.1.9] (HELO mailr.qinetiq-tim.net) (128.98.1.9) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 16 Nov 2009 14:19:12 +0000 Received: from mailhost.eris.qinetiq.com (mailhost.eris.qinetiq.com [128.98.2.2]) by mailr.qinetiq-tim.net (Postfix) with SMTP id E78BF8CD68 for ; Mon, 16 Nov 2009 14:20:19 +0000 (GMT) Received: (qmail 13845 invoked from network); 16 Nov 2009 14:18:50 -0000 Received: from unknown (HELO mwatts.eris.qinetiq.com) (128.98.10.176) by mailhost.eris.qinetiq.com with SMTP; 16 Nov 2009 14:18:50 -0000 Received: from [127.0.0.1] (localhost [127.0.0.1]) by mwatts.eris.qinetiq.com (Postfix) with ESMTP id D5DD82607D; Mon, 16 Nov 2009 14:18:50 +0000 (GMT) Subject: Re: A fundamentally secure Apache server, any interest? From: Mark Watts To: dev@httpd.apache.org Cc: "Sweere, Kevin E CTR USAF AFRL/RYT" In-Reply-To: <76ACC4E92B18BB4F9F600EEE16623686026D695F@VFOHMLAO01.Enterprise.afmc.ds.af.mil> References: <76ACC4E92B18BB4F9F600EEE16623686026D695F@VFOHMLAO01.Enterprise.afmc.ds.af.mil> Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="=-ufu+njKYA18Ke9IHZsgQ" Organization: QinetiQ Date: Mon, 16 Nov 2009 14:18:50 +0000 Message-Id: <1258381130.22411.58.camel@mwatts.eris.qinetiq.com> Mime-Version: 1.0 X-Mailer: Evolution 2.24.5 (2.24.5-2.fc10) --=-ufu+njKYA18Ke9IHZsgQ Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Mon, 2009-11-16 at 08:42 -0500, Sweere, Kevin E CTR USAF AFRL/RYT wrote: > Greetings, > =20 > I work for the US Air Force. We have a prototype that dramatically, > fundamentally increases a web server's security. =20 > =20 > We run an Apache server within a minimized, user-level-only, Linux varian= t > only within RAM and from only a DVD (no harddrive). With no shells, hack= ers > have nowhere to go. With no persistent memory, malware has no place to > reside. A simple reboot restores the website to a pristine state within > minutes. =20 > =20 > Because a LiveDVD holds the OS, apps and content, its best for static, > non-interactive, low-volume, high-value, highly-targeted websites. Any > change means burning a new DVD, but this also makes testing easier and le= ss > noisy. Logs are tricky to extract.=20 > =20 > While it has worked well, some of us believe its usability drawbacks (e.g= . > limited ability to receive input from users, every change needs a new DVD= ) > outweigh its great security benefits making it unmarketable (in govt or > industry) and thus just another prototype to leave on the shelf. > =20 > I'm curious what your group thinks. Thanks in advance -- I don't quite k= now > with whom to discuss this idea. > =20 > Kevin Sweere Hi Kevin, The idea of a CD/DVD-ROM based webserver isn't new, I know we did some internal research into it many years ago and came to the same conclusions you have - the level of security offered seriously impedes your ability to use/manage the server. You also run into problems if your servers don't actually have an optical drive (eg: Blades). If I was looking for that level of assurance that my data hasn't been tampered with, I'd be looking at using a mechanism of snapshoting your webserver in some way such that a rollback is trivial. Linux LVM, Solaris ZFS or even VMWare all offer this kind of snapshot and rollback. I'd also be using TripWire or something similar to verify my content directories. Apache configured with minimum modules to simply serve static ASCII and image files is about as secure at it gets for that type of content. SELinux stops a rogue CGI from reading /etc/shadow, and mod_security helps to block a lot of crud from ever generating a response from the server. Read-Only web servers are certainly secure but by their nature, very time-consuming to manage. Mark. --=20 Mark Watts BSc RHCE MBCS Senior Systems Engineer, Managed Services Manpower www.QinetiQ.com QinetiQ - Delivering customer-focused solutions GPG Key: http://www.linux-corner.info/mwatts.gpg --=-ufu+njKYA18Ke9IHZsgQ Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEABECAAYFAksBX0oACgkQBn4EFUVUIO35mQCfZRyjuU/hdcuIhrVJuTt8UuHW hWMAoOZMXaKJHUiDumiiG2ZY3UgeapEw =hPV5 -----END PGP SIGNATURE----- --=-ufu+njKYA18Ke9IHZsgQ--