Apache Security - Ivan Ristic [225]
patterns, usage, Reverse Proxy Patterns, Front door, Integration reverse proxy, Protection reverse proxy, Performance reverse proxy
front door, Front door
integration, Integration reverse proxy
performance, Performance reverse proxy
protection, Protection reverse proxy
risk, Calculating Risk, Calculating Risk, Per-request change of Apache identity, Isolating Application Modules, Network Design
calculating, Calculating Risk
factors, Calculating Risk
isolating in a network, Network Design
multiple levels of, Isolating Application Modules
public service as root, Per-request change of Apache identity
Rivest, Shamir, and Adleman (RSA) public-key encryption, Asymmetric Encryption
RLimitCPU directive, Setting CGI Script Limits
RLimitMEM directive, Setting CGI Script Limits
RLImitNPROC directive, Setting CGI Script Limits
RRDtool (data storage), Web Server Status
RSA (Rivest, Shamir, and Adleman) public-key encryption, Asymmetric Encryption
run_test.pl automated test tool, Deployment Guidelines
S
safe mode, PHP, Setting Safe Mode Options
Sam Spade information-gathering tool, Sam Spade
SAPI input hooks, PHP 5 SAPI Input Hooks
Satisfy, Combining authentication with network access control
ScriptAlias directive, Enabling CGI Scripts, ScriptAlias versus script enabling by configuration
enabling script execution, ScriptAlias versus script enabling by configuration
scripting, XSS security flaw, Cross-Site Scripting, Cross-Site Scripting, XSS attack resources, Cross-site scripting attacks, Cross-site scripting attacks
attack warning patterns, Cross-site scripting attacks
consequences, Cross-Site Scripting
detecting attacks, Cross-site scripting attacks
resources for, XSS attack resources
search engines, Search engines
SEC (Simple Event Correlator), Simple Event Correlator
SecFilterForceByteRange directive, Byte-range restriction
SecFilterInheritance directive, Complex configuration scenarios
SecFilterScanPOST directive, Request body monitoring
SecFilterSelective directive, Response body monitoring
secret-key encryption, Symmetric Encryption
SecUploadInMemoryLimit directive, Memory consumption
Secure FTP (SFTP), Restricting and Securing User Access
Secure Hash Algorithm 1 (SHA-1), One-Way Encryption
Secure Sockets Layer, SSL (see SSL)
security, Apache Security Principles, Security Definitions, Security Definitions, Security Definitions, Security Definitions, Essential Security Principles, Common Security Vocabulary, Security Process Steps, Threat Modeling, Threat Modeling, Threat Modeling, Threat Modeling, Threat Modeling, System-Hardening Matrix, Calculating Risk, Calculating Risk, Apache View, Static Binary or Dynamic Modules, Options directive, PHP, Using PHP as a CGI, Increasing Session Security, Setting Safe Mode Options, SSL and TLS, Cryptography, Execution wrappers, Per-request change of Apache identity, Information Leaks on Execution Boundaries, Information Leaks on Execution Boundaries, Running PHP as a Module, Running PHP as a Module, Isolating Application Modules, Network Design, Protection reverse proxy, Referrer Check Flaws, Negative versus positive security models, Web Security Scanners, Nikto, Nessus
Apache backdoors, Static Binary or Dynamic Modules
authentication, flawed, real-life example of, Referrer Check Flaws
CIA triad, Security Definitions
common phases example, Security Definitions
cryptography, Cryptography (see cryptography)
defensible networks (Bejtlich), Security Definitions
file descriptor leakage vulnerability, Information Leaks on Execution Boundaries, Information Leaks on Execution Boundaries
hardening, system-hardening matrix, System-Hardening Matrix
HTTP communication security, SSL and TLS
hybrid model, Execution wrappers
models, negative versus positive, Negative versus positive security models
PHP, PHP, Using PHP as a CGI, Increasing Session Security, Setting Safe Mode Options, Running PHP as a Module, Running PHP as a Module
interpreter issues, Using PHP as a CGI
module, making secure, Running PHP