_____________ ____ ____ ____ ____ ____ ____ ____ ____ ______________
|| |||a |||s |||c |||i |||i |||w |||e |||b ||| ||
||____________|||__|||__|||__|||__|||__|||__|||__|||__|||_____________||
|/____________\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/__\|/_____________\|
::::::::::::::::::::::::::::::Times-Tribune:::::::::::::::::::::::::::::
.------------------------------------------------------------------------.
| ASCIIweb Times-Tribune Vol. I Issue I. |
'------------------------------------------------------------------------'
.------------. . |. . .|_____
| Welcome to | ,-. ,-. ,-. . . ,-. . |- . . '-contents--'
| ASCIIweb! | `-. |-' | | | | | | | | intro |
'------------' `-' `-' `-' `-^ ' ' `' `-| installing |
.------------. --------------------------/|- configuring|
| intro | `-' conf files |
'------------' editing |
.------------. Allowing a user access to your system over a security |
| manual | network is a security risk. This includes tricks |
'------------' email, web, and other network services. staticmode |
.------------. RFKML |
| license | Any time a remote user's actions cause credits |
'------------' applications to run on your system, you are COPYING |
.------------. in danger of having your system comprimised .-----------|
| directory | through a flaw in the designs of any one of | .-----'
'------------' the pieces that make that application run. |. . .|
.------------. | . . |
| changelog | One very common entry point for malicious |. . .|
'------------' users is the dynamic cgi script, and in | . . |
.------------. particular, the execution of arbitrary code |. . .|
| bugs | by a dynamic cgi script. | . . |
'------------' |. . .|
.------------. We understand this possibility, and have | . . |
| wishlist | attempted to harden ASCIIweb against such |. . .|
'------------' an attack. However, no software is bullet- | . . |
.------------. proof. Therefore it is your responsibility |. . .|
| website | as a system administrator or user to | . . |
'------------' consider the risks involved and make sure |. . .|
.------------. that your actions are prudent and | . . |
| beta v0.90 | acceptable. |. . .|
'------------' | . . |
\...... . | STATIC MODE |. . .|
|. .| ---------- | . . |
| . | |. . .|
|. .| You can avoid all the security hassles of | . . |
| . | dynamic cgi scripts by not running it as a |. . .|
|. .| cgi! Instead, use static mode to render the | . . |
| . | pages from your source files, removing the |. . .|
|. .| ability of an attacker to run any programs | . . |
| . | not already allowed by your webserver. This |. . .|
|. .| method takes out all the potential cgi | . . |
| . | attacks. It also removes any additional |. . .|
|. .| load your server might experience because | . . |
| . | of ASCIIweb. |. . .|
|. .| | . . |
| . | Unfortunately, static page generation also |. . .|
|. .| eliminates many of ASCIIweb's cooler features. | . . |
| . | |. . .|
|. .| OTHER FEATURES | . . |
| . | -------------- |. . .|
|. .| | . . |
| . | ASCIIweb has several features designed to |. . .|
|. .| help run aw as a cgi while still maintaining | . . |
| . | the level of security you are comfortable with. |. . .|
|. .| | . . |
| . | docdir is the directory under which all documents |. . .|
|. .| must live if ASCIIweb is to display them, and | . . |
| . | is roughly equivalent to Apache's |. . .|
|. .| DocumentRoot option. This keeps users from | . . |
| . | successfully reading files which should not be |. . .|
|. .| visible to web users (like /etc/passwd). | . . |
| . | |. . .|
|. .| Example: | . . |
| . | docdir=/var/www/tastytronic.net/asciiweb/test/ |. . .|
|. .| | . . |
| . | ASCIIweb checks the absolute path of any |. . .|
|. .| requested files using Perl's CWD::abs_path | . . |
| . | function and verifies that it lies within |. . .|
|. .| docdir, thus stopping the traditional | . . |
| . | /../../../etc/passwd attack. |. . .|
|. .| | . . |
| . | SCRIPTS |. . .|
|. .| ------- | . . |
| . | |. . .|
|. .| scriptdir is like docdir for scripts. Scriptdir | . . |
| . | is the document directory for secondary |. . .|
|. .| scripts. This encourages your administrator to | . . |
| . | specify by hand the scripts or binaries |. . .|
|. .| allowed to be run by ASCIIweb. Any executables | . . |
| . | not in or symlinked to scriptdir will not |. . .|
|. .| run. Your scriptdir must be within your docdir. | . . |
| . | |. . .|
|. .| allowexecute is the conf directive that specifies | . . |
| . | whether included scripts may be run. ASCIIweb is |. . .|
|. .| able to incorporate the output of secondary | . . |
| . | scripts into it's normal output. This can be |. . .|
|. .| useful for displaying up-to-the minute stats | . . |
| . | such as system load, or system time. However, |. . .|
|. .| it is an additional security risk. You may | . . |
| . | prefer to disable it. |. . .|
|. .| | . . |
| . | Example: |. . .|
|. .| allowexecute=1 | . . |
| . | or |. . .|
|. .| allowexecute=0 | . . |
| . | |. . .|
|. .| executepage is related to allowexecute. If users | . . |
| . | are allowed to include script output, are they |. . .|
|. .| allowed to use secondary scripts which provide | . . |
| . | the complete output for a page? This is a |. . .|
|. .| greater security risk as it potentially allows | . . |
| . | a remote user to see filenames and paths of |. . .|
|. .| secondary scripts. | . . |
| . | |. . .|
|. .| Back: Editing Next: Tricks | . . |
| . | <-- --> |. . .|
.------------------------------------------------------------------------.
| The ASCIIweb Times-Tribune is a Tastytronic Industries newspaper. |
'------------------------------------------------------------------------'
Generated at: Wed Oct 29 14:18:16 CDT 2025