|
Topics: 92 Replies: 259
Member
Post: #12028 PT: #1/8
|
Following an RFI attack (not through ICT) on my webserver I am initiating stronger security precautions.
What of the following in my php.ini file will NOT interfere with ICT software?
Thanks,
jim
Code
disable_functions = exec,shell_exec,passthru,system,eval,show_source,proc_open, popen,parse_ini_file,dl
|
|
|
|
|
|
Camil |
January 12th, 2010 22:41 GMT |
|
|
|
|
|
|
|
Topics: 92 Replies: 259
Member
Post: #12032 PT: #3/8
|
This message was edited by jimlongo on January 13th, 2010 02:23 GMT
Thanks Camil. That seems alright.
If anyone's interested I've put this in my php.ini file with no effect on ICT.
Note: may work or not depending on some of your server defaults
Code
allow_url_fopen = Off
register_globals = Off
expose_php = Off
magic_quotes_gpc = On
magic_quotes_sybase = Off
disable_functions = exec,shell_exec,passthru,system,show_source,proc_open, popen,parse_ini_file,dl
and to protect your php.ini file put this in your .htaccess file
Code
# PROTECT php.ini file.
<Files php.ini>
order allow,deny
deny from all
</Files>
and found this really good block for a lot of exploits, check out the article at Perishable Press
|
|
|
|
|
|
Camil |
January 13th, 2010 02:39 GMT |
|
|
|
|
|
|
|
|
Camil |
January 18th, 2010 23:19 GMT |
|
|
|
|
|
|
|
Topics: 92 Replies: 259
Member
Post: #12108 PT: #7/8
|
By the way I've upgraded the Perishable Press blocklist on all my sites from the 4G version to the 5G version.
I've been running the beta for over a year without any problems whatsoever, it's a lot simpler than the previous version and very effective at stopping many attacks. It's recently been released as final.
The 5G Perishable Press Blocklist
|
|
|
|
|
|
Camil |
March 09th, 2012 14:12 GMT |
|
|
|
|
|
|