Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 29054 invoked from network); 19 Oct 2005 08:51:26 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 19 Oct 2005 08:51:26 -0000 Received: (qmail 12661 invoked by uid 500); 19 Oct 2005 08:51:13 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 12642 invoked by uid 500); 19 Oct 2005 08:51:12 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 12631 invoked by uid 99); 19 Oct 2005 08:51:12 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 19 Oct 2005 01:51:12 -0700 X-ASF-Spam-Status: No, hits=0.9 required=10.0 tests=HTML_10_20,HTML_MESSAGE,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (asf.osuosl.org: domain of kailash.vyas@gmail.com designates 64.233.184.201 as permitted sender) Received: from [64.233.184.201] (HELO wproxy.gmail.com) (64.233.184.201) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 19 Oct 2005 01:51:12 -0700 Received: by wproxy.gmail.com with SMTP id i6so128839wra for ; Wed, 19 Oct 2005 01:50:50 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type; b=lWI9p5Yl220UMZzKU9iUKwejIQItlQdyA35kOJ+5eXED0KOk2KJn1LAeb63JZw0aCna3GVqKqyZshw8DaI+pbmEA2k2Z7BjDeQFc+372RPQ7LVu/xpcR0m/X4Wn0veenKFkHdXRexF0JFVj0JlOmGk0P4Xkgorw9gJfDewQBXak= Received: by 10.54.105.19 with SMTP id d19mr144406wrc; Wed, 19 Oct 2005 01:49:03 -0700 (PDT) Received: by 10.54.128.2 with HTTP; Wed, 19 Oct 2005 01:50:49 -0700 (PDT) Message-ID: Date: Wed, 19 Oct 2005 09:50:49 +0100 From: Kailash Vyas To: users@httpd.apache.org MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_333_9584011.1129711849329" X-Virus-Checked: Checked by ClamAV on apache.org Subject: [users@httpd] security issue X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N ------=_Part_333_9584011.1129711849329 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline hi all, I was facing some problems with webserver security. There was a process running on the server which was downloaded to tmp directry by using wget from a script making rpc calls on the server. I have disabled the wget execute permissions but how do i make the webserve= r more secure for preventing such activities. I am running apache 1.3 on server. thanks, kailash ------=_Part_333_9584011.1129711849329 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline hi all,

I was facing some problems with webserver security.
There was a process running on the server which was downloaded to tmp directry by using wget from a script making rpc calls on the server.
I have disabled the wget execute permissions but how do i make the webserve= r more secure for preventing such activities.
I am running apache 1.3 on server.

thanks,
kailash
------=_Part_333_9584011.1129711849329--