_____________ ____ ____ ____ ____ ____ ____ ____ ____ ______________ || |||a |||s |||c |||i |||i |||w |||e |||b ||| || ||____________|||__|||__|||__|||__|||__|||__|||__|||__|||_____________|| |/____________\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/_____________\| ::::::::::::::::::::::::::::::Times-Tribune::::::::::::::::::::::::::::: .------------------------------------------------------------------------. | ASCIIweb Times-Tribune Vol. I Issue I. | '------------------------------------------------------------------------' .------------. . |. . .|_____ | Welcome to | ,-. ,-. ,-. . . ,-. . |- . . '-contents--' | ASCIIweb! | `-. |-' | | | | | | | | intro | '------------' `-' `-' `-' `-^ ' ' `' `-| installing | .------------. --------------------------/|- configuring| | intro | `-' conf files | '------------' editing | .------------. Allowing a user access to your system over a security | | manual | network is a security risk. This includes tricks | '------------' email, web, and other network services. staticmode | .------------. RFKML | | license | Any time a remote user's actions cause credits | '------------' applications to run on your system, you are COPYING | .------------. in danger of having your system comprimised .-----------| | directory | through a flaw in the designs of any one of | .-----' '------------' the pieces that make that application run. |. . .| .------------. | . . | | changelog | One very common entry point for malicious |. . .| '------------' users is the dynamic cgi script, and in | . . | .------------. particular, the execution of arbitrary code |. . .| | bugs | by a dynamic cgi script. | . . | '------------' |. . .| .------------. We understand this possibility, and have | . . | | wishlist | attempted to harden ASCIIweb against such |. . .| '------------' an attack. However, no software is bullet- | . . | .------------. proof. Therefore it is your responsibility |. . .| | website | as a system administrator or user to | . . | '------------' consider the risks involved and make sure |. . .| .------------. that your actions are prudent and | . . | | beta v0.90 | acceptable. |. . .| '------------' | . . | \...... . | STATIC MODE |. . .| |. .| ---------- | . . | | . | |. . .| |. .| You can avoid all the security hassles of | . . | | . | dynamic cgi scripts by not running it as a |. . .| |. .| cgi! Instead, use static mode to render the | . . | | . | pages from your source files, removing the |. . .| |. .| ability of an attacker to run any programs | . . | | . | not already allowed by your webserver. This |. . .| |. .| method takes out all the potential cgi | . . | | . | attacks. It also removes any additional |. . .| |. .| load your server might experience because | . . | | . | of ASCIIweb. |. . .| |. .| | . . | | . | Unfortunately, static page generation also |. . .| |. .| eliminates many of ASCIIweb's cooler features. | . . | | . | |. . .| |. .| OTHER FEATURES | . . | | . | -------------- |. . .| |. .| | . . | | . | ASCIIweb has several features designed to |. . .| |. .| help run aw as a cgi while still maintaining | . . | | . | the level of security you are comfortable with. |. . .| |. .| | . . | | . | docdir is the directory under which all documents |. . .| |. .| must live if ASCIIweb is to display them, and | . . | | . | is roughly equivalent to Apache's |. . .| |. .| DocumentRoot option. This keeps users from | . . | | . | successfully reading files which should not be |. . .| |. .| visible to web users (like /etc/passwd). | . . | | . | |. . .| |. .| Example: | . . | | . | docdir=/var/www/tastytronic.net/asciiweb/test/ |. . .| |. .| | . . | | . | ASCIIweb checks the absolute path of any |. . .| |. .| requested files using Perl's CWD::abs_path | . . | | . | function and verifies that it lies within |. . .| |. .| docdir, thus stopping the traditional | . . | | . | /../../../etc/passwd attack. |. . .| |. .| | . . | | . | SCRIPTS |. . .| |. .| ------- | . . | | . | |. . .| |. .| scriptdir is like docdir for scripts. Scriptdir | . . | | . | is the document directory for secondary |. . .| |. .| scripts. This encourages your administrator to | . . | | . | specify by hand the scripts or binaries |. . .| |. .| allowed to be run by ASCIIweb. Any executables | . . | | . | not in or symlinked to scriptdir will not |. . .| |. .| run. Your scriptdir must be within your docdir. | . . | | . | |. . .| |. .| allowexecute is the conf directive that specifies | . . | | . | whether included scripts may be run. ASCIIweb is |. . .| |. .| able to incorporate the output of secondary | . . | | . | scripts into it's normal output. This can be |. . .| |. .| useful for displaying up-to-the minute stats | . . | | . | such as system load, or system time. However, |. . .| |. .| it is an additional security risk. You may | . . | | . | prefer to disable it. |. . .| |. .| | . . | | . | Example: |. . .| |. .| allowexecute=1 | . . | | . | or |. . .| |. .| allowexecute=0 | . . | | . | |. . .| |. .| executepage is related to allowexecute. If users | . . | | . | are allowed to include script output, are they |. . .| |. .| allowed to use secondary scripts which provide | . . | | . | the complete output for a page? This is a |. . .| |. .| greater security risk as it potentially allows | . . | | . | a remote user to see filenames and paths of |. . .| |. .| secondary scripts. | . . | | . | |. . .| |. .| Back: Editing Next: Tricks | . . | | . | <-- --> |. . .| .------------------------------------------------------------------------. | The ASCIIweb Times-Tribune is a Tastytronic Industries newspaper. | '------------------------------------------------------------------------' Generated at: Thu Sep 11 15:16:02 CDT 2025