[pmwiki-users] Error encountered with upgrade to 2.2 beta 65

Henrik henrik.bechmann at sympatico.ca
Wed Mar 26 15:02:06 CDT 2008


Thanks for pointing me to the specific module responsible for the 
security, Patrick, and for the reality check.

I am continuing to investigate alternate webserver hosts. 
canadianwebhosting.com looks promising. They use an suPHP 
scheme which looks tight but workable, with "Your scripts and 
directories can have a maximum of 755 permissions" (all files have the 
same owner with rwx). I presume that would be workable? Would I have to 
reconfigure the umask(002); statement in pmwiki.php for this?

Hope you're well. I just (finally) upgraded one of my sites 
(www.dufferinpark.c) to 2.2, soon will do the others (the rest are all 
part of one farm). Then I'm *really* looking forward to playing with all 
the cool new features!


- Henrik

Patrick R. Michaud wrote:
> On Sun, Mar 23, 2008 at 10:11:49AM -0400, Henrik wrote:
>> This security change by my webhost is confirmed. In response to my query 
>> they sent me the following response.
>> =============================
>> The web server security is setup such that it will automatically block system related words while posting data from php based applications, as this may lead to web server exploit. We request you to stop using system related words in your applications.
>> =============================
>> So suddenly none of my websites can post external links (with the string 
>> "http://" anywhere in the page), and hundreds if not thousands of pages 
>> that have this protocol embedded are suddenly uneditable.
>> Truly horrible. A complete nightmare!
>> But nothing to do with PmWiki.
> Just to follow up on this -- this particular issue is described
> at http://www.pmwiki.org/wiki/PmWiki/Troubleshooting#mod_security .
> There is no PmWiki-based workaround to it, as the problem is well
> outside of PmWiki (as you've recognized).
> I've never heard of someone using mod_security to block "http://" 
> before, though, so that's new (and an additional reason to doubt
> the sanity of the webhosting provider).  Note that this security
> measure affects not only PmWiki, but also any application that
> tries to use an input form where someone might want to provide
> an http:// link (e.g., comments to blog postings, shopping carts,
> etc.).
> Pm


Henrik Bechmann
Webmaster, www.dufferinpark.ca

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.pmichaud.com/pipermail/pmwiki-users/attachments/20080326/1c8569d1/attachment-0001.html 

More information about the pmwiki-users mailing list