Actions

Installation security hints/sl: Difference between revisions

From LimeSurvey Manual

(Updating to match new version of source page)
(Updating to match new version of source page)
Line 4: Line 4:
==Splošno==
==Splošno==


LimeSurvey se zanaša na svoj lasten varnostni sistem, ki je samodejno vključen. Avtorji tega programa ne prevzemajo nobene odgovornosti in ne dajejo nobenih izjav v zvezi z ustreznostjo ali varnostjo te opreme. Kljub temu jemljemo varnost zelo resno in hitro reagiramo. Če veste za kakršen koli varnostni problem z LimeSurvey-em, nas prosimo obvestite na naš [http://bugs.limesurvey.org portal za sledenje težavam] (imejte v vednosti, da je zaseben).
LimeSurvey relies on its own security, which is activated by default. The authors of this software takes no responsibility and makes no claims in relation to the appropriateness or the security level of this software. However, we take security issues very serious and react quickly - if you know of any security problems with LimeSurvey, please let us know either by sending us an e-mail at [mailto:info@limesurvey.org info@limesurvey.org] or by opening a bug report in our [http://bugs.limesurvey.org bug tracker] (please mark it as private).


==Pravice na Linux-ovih datotekah==
==Pravice na Linux-ovih datotekah==
Line 16: Line 16:
<div class="simplebox">[[File:help.png]] '''Namig:''' Nastavljanje pravic na datotekah je še posebej pomembno pri zaščiti konfiguracijskih datotek, ki vsebujejo zelo kritične podatke kot so gesla.</div>
<div class="simplebox">[[File:help.png]] '''Namig:''' Nastavljanje pravic na datotekah je še posebej pomembno pri zaščiti konfiguracijskih datotek, ki vsebujejo zelo kritične podatke kot so gesla.</div>


''Upoštevajte, da ima 'root' račun kot super skrbniški uporabnik vedno odobren dostop do vaših datotek (ne glede na to, kakšne pravice nad datotekami ste nastavili).''
''Bear in mind that the 'root' account will always be granted permission to access your files (no matter what file permissions you set) as it is the super-admin user.''


Spletni strežnik (na katerem teče LimeSurvey) teče pod točno določeno identiteto (uporabnikom). Na Linux-u je to običajno uporabnik 'www','www-data' (na Debian/Ubuntu), 'apache' ali 'nobody'. Nekateri ponudniki za gostovanja uporabljajo sisteme (kot je suexec), ki omogočajo zaganjanje LimeSurvey-evih zagonskih datotek z vašim osebnim uporabniškim računom. Seveda morajo imeti uporabniki na spletnih strežnikih pravico branja na LimeSurvey-evih datotekah. Le manjša skupina LimeSurvey-evih podmap mora biti zapisljivih s strani spletnih uporabnikov.
The web server (which runs LimeSurvey) is also running under a given identity (user). On Linux, this is usually the 'www', 'www-data' (on Debian/Ubuntu), 'apache' or 'nobody' user. However, some hosting companies use systems (such as suexec) that make possible the running of LimeSurvey scripts with your personal user. Of course, the web server user must have the right to read LimeSurvey files. However, only a small subset of LimeSurvey sub-directories must be writable by the web server user.


<div class="simplebox">[[File:help.png]] '''Namig''': zelo pomembno je, da prekličete pravico pisanja za spletnega uporabnika nad tistimi podmapami, ki tega ne potrebujejo. Čeprav bi se morda našle ranljivosti v LimeSurvey-u, bi bile glavne datoteke še vedno zaščitene pred  nedovoljenim spreminjanjem zahvaljujoč sistemskim pravicam nad datotekami.</div>
<div class="simplebox">[[File:help.png]] '''Hint''': It is very valuable to revoke write permission for the web server user to these LimeSurvey sub-directories that do not require it. Indeed, even if a LimeSurvey vulnerability might be discovered, the main files will still be protected from an illicit modification thanks to the file system permissions.</div>


===Nastavljanje pravic nad datotekami na Linux-sistemu v lastnem upravljanju===
===Nastavljanje pravic nad datotekami na Linux-sistemu v lastnem upravljanju===


Če upravljate lasten spletni strežnik in operacijski sistem (ste lastnik strežnika ali imate v najemu virtualni strežnik, na katerem imate korenski dostop), lahko upoštevate ta priporočila.
If you're managing your web server and operating system configuration (you are the owner of the physical server or are renting a virtual server on which you have root access), you can follow the following the recommendations from below.


Najprej lahko nastavite lastnika in skupino vaših LimeSurvey-evih datotek, s čimer bo olajšano nastavljanje pravic nad datotekami.
You can first set the owner and group of your LimeSurvey files so that it will ease the file permissions setup. A possible strategy is to set the owner of the LimeSurvey files to your personal username, and the group of the LimeSurvey files to the web server group. Usually, this web server group only contains the web server account (and possibly another webmaster account). For instance, if your username is 'myaccount' and the webserver user is 'apache' in the 'apache' group, then, from a shell access, you can use the following command: <code>$ chown -R myaccount:apache limesurvey/</code>. Then set the file and sub-directories permissions.


Eden možnih pristopov je, da nastavite za lastnika LimeSurvey-evih datotek vaše osebno uporabniško ime in skupino LimeSurvey-ih datotek  skupino spletnega strežnika. Običajno ta skupina spletnega strežnika vsebuje le račun spletnega strežnika (in najverjetneje še kakšen račun za spletnega skrbnika).
For the script to work properly, the write access to some directories is needed:
 
*The /limesurvey/application/config directory requires ''Read & Write'' for saving the application configuration settings.
Na primer če je vaše uporabniško ime 'mojračun' in je uporabnik spletnega strežnika 'apache' v skupini 'apache', potem lahko iz ukazne lupine uporabite sledeč ukaz:
*The "/limesurvey/tmp" directory and its sub-directories are used for imports/uploads and should be set to ''Read & Write'' for your web server.
 
*The upload/directory and all its sub-directories must also have set ''Read & Write'' permissions in order to enable pictures and media files upload.
$ chown -R myaccount:apache limesurvey/
* All other directories and files can be set to ''Read Only''.
 
Potem nastavite pravice nad datotekami in podmapami.
 
Da bodoukazne datoteke (skripte) ustrezno delovale, potrebujejo pravico pisanja nad nekaterimi mapami:
*"/limesurvey/tmp" mapi in njenih podmapah, ki se uporabljajo za uvažanje/nalaganje in morajo biti nastavljene na  ''branje in pisanje'' na vašem spletnem strežniku.
*mapa upload/ in vse njene podmape prav tako potrebujejo pravico ''branja in pisanja'' na vašem spletnem strežniku, če želite omogočiti nalaganje slikam in medijskim datotekam.
* vse ostale mape in datoteke so lahko nastavljeno na pravico ''samo za branje''


<div class="simplebox">[[File:help.png]] '''Namig:''' v kolikor boste upoštevali zgornja priporočila, lahko te nastavitve uveljavite z naslednjimi ukazi:
<div class="simplebox">[[File:help.png]] '''Namig:''' v kolikor boste upoštevali zgornja priporočila, lahko te nastavitve uveljavite z naslednjimi ukazi:


$ chmod -R o-r-w-x limesurvey/
<code>$ chmod -R o-r-w-x limesurvey/</code>


$ chmod -R -w limesurvey/
<code>$ chmod -R -w limesurvey/</code>


$ chmod -R 770 limesurvey/tmp
<code>$ chmod -R 770 limesurvey/application/config</code>


$ chmod -R 770 limesurvey/tmp
<code>$ chmod -R 770 limesurvey/tmp</code>


$ chmod -R 770 limesurvey/upload
<code>$ chmod -R 770 limesurvey/upload</code>


</div>
</div>


===Nastavljanje pravic nad datotekami na gostujočem spletnem strežniku===
===Setting file permissions on a hosted web server===


Posredovanje običajnega postopka za zaščito spletne aplikacije v gostujočih okoljih je težavno, saj se okolja za gostovanja med seboj razlikujejo na več načinov.
Giving the difficulty of a standard procedure to secure a web application on a hosted environment, it is rather difficult because hosted environments differ in so many ways.


Podobno kot v primeru strežnika v lastnem upravljanju je potrebna za pravilno delovanje zagonskih datotek (skript) pravica pisanja nad nekaterimi mapami:
In the managed server case, the server needs write access to some directories in order for the script to work properly:
* "/limesurvey/tmp" mapi in njenih podmapah, ki se uporabljajo za uvažanje/nalaganje in morajo biti nastavljene na branje in pisanje na vašem spletnem strežniku.
*The "/limesurvey/tmp" directory is used for imports/uploads and should be set to ''Read & Write'' for your web server.
*mapa upload/ in vse njene podmape prav tako potrebujejo pravico ''branja in pisanja'' na vašem spletnem strežniku, če želite omogočiti nalaganje slikam in medijskim datotekam.
*The upload/directory and all its sub-directories must also have ''Read & Write'' for your web server in order to enable pictures and media files upload.
* vse ostale mape in datoteke so lahko nastavljeno na pravico ''samo za branje''
* The other directories and files should be set to ''Read Only''.


<div class="simplebox">[[File:help.png]] '''Hint:'''
<div class="simplebox">[[File:help.png]] '''Hint:'''
* v odvisnosti od nastavitev vašega spletnega strežnika boste morali spremeniti pravico nad zapisljivimi mapami z ukazom ''chmode'' na 755 ali 777, da bodo postale zapisljive za spletni strežnik. Najprej poskušajte z 755 in če to ne bo delovalo 'povišajte' na 777.
* Depending on your web server configuration, you will have to chmod the rights on the writable folders to 755 or 777 to make it writable for the web server. Try 755 first, if it does not work, 'upgrade' to 777.
* prav tako lahko poskušate odstraniti pravico branja nad datoteko  config.php za ostale uporabnike z nastavitvijo pravice na 750 in če ne bo delovalo 'povišajte' na 755.</div>
* You can also try to remove other users' read access to config.php by setting this file's permissions to 750 - if it does not work, 'upgrade' to 755.</div>


==Pravice nad datotekami v okolju Windows==
==Pravice nad datotekami v okolju Windows==


Če uporabljate windows strežnik si morate zagotoviti, da skrbniške mape dovoljujejo lastniku procesov spletnega strežnika pisanje v datoteke v tem imeniku, sicer pa lahko imajo vse druge datoteke nastavljeno pravico samo za branje in izvajanje.
If you are using a Windows server, your should ensure that the admin folder allows the owner of the web server process to write files to this directory, The rest of the files can be set to read-only and execute.


==Ostale varnostne zadeve==
==Ostale varnostne zadeve==
Line 77: Line 70:


===SSL usage===
===SSL usage===
In general we recommend the usage of SSL for sensitive survey data.
We generally recommend the usage of SSL for sensitive survey data. You usually enable SSL by configuring your web server correctly and using a SSQL certificate. If you have enabled SSL, you should enforce SSL all the time via the [Global settings] option of LimeSurvey. Additionally, you could set only to use 'secure' cookies by editing/adding the [[Optional_settings#Session_settings|related option]] in config.php.
You usually enable SSL by configuring your webserver correctly and using a SSQL certificate.
If you have enabled SSL you should enforce SSL at all time in  the global settings of LimeSurvey. Additionally you should set only to used 'secure' cookies by using the [[Optional_settings#Session_settings|related option]] in config.php.


=== The access to the config.php file ===


=== Access of config.php file ===
{{Alert| You must update application/config/'''config.php''' only after the first installation is done and it works.}}


{{Alert|You must update application/config/config.php only after first installation is done and work. You have to update existing config.php file.}}
The /application/config/config.php file contains a user name and password for your database server. This poses certain security issues, particularly if you are using a login that has high level administrative access to your database. In the event of some error returning the content of this PHP file to a user's browser, your database password and other details could be compromised (please note, that this is a very unlikely scenario). The best way to minimize risk is to set up a specific login that has specific rights only to your LimeSurvey database.


The /application/config/config.php file contains a user name and password for your database server. This poses certain security issues, particularly if you are using a login that has high level administrative access to your database. In the event of some error returning the content of this PHP file to a user's browser, your database password and other details could be compromised (please note, that this is a very unlikely scenario). The best way to minimize risk is to set up a specific login that has specific rights only to your limesurvey database.
Another way to secure this information can be to put the certain information from the /application/config/config.php file in a non-web directory, i.e. for Apache users this is the directory above the htdocs (also known as public_html or www) folder. Basically, you will use config.php, but have one line in it - a line that includes the file with ACTUAL configuration information (ex: <code><?php return include("/home/hostfolder/safedata/configreal.php"); ?></code>). Remove all actual configuration information from /application/config/config.php and paste it into the other file (configreal.php) that is mentioned in the /application/config/'''config.php''' file. This other file should be located in a non-web directory. Then /application/config/config.php will not contain database passwords, etc. - just the name of the file that '''DOES''' contain the database info.  


Drugi način za zavarovanje teh informacij je lahko prestavitev določenih podatkoviz datoteke /application/config/config.php file v mapo, ki ni v spletnem imeniku. Za Apache uporabnike je ta imenik znotraj mape htdocs (oziroma public_html ali www). Tako boste uporabljali datoteko config.php, vendar boste imeli v njej eno vrstico, ki vključuje datoteko z dejanskimi informacijami o nastavitvah (primer: <?php return include("/home/hostfolder/safedata/configreal.php"); ?>). Iz datoteke  /application/config/config.php odstranite vse aktualne informacije o nastavitvah in jih prilepite v drugo datoteko (configreal.php), ki je vključena v datoteki /application/config/config.php. Ta datoteka se mora nahajati izven spletnega imenika. V tem primeru datoteka /application/config/config.php ne bo vsebovala gesla podatkovne zbirke itd., pač pa samo ime datoteke, ki vsebuje informacije o podatkovni zbirki. S tem se izognete spremembam vseh drugih datotek vključenih v datoteki /application/config/config.php, glede na to da so še vedno vključene in bodo vsebovale realne informacije o nastavitvah. Boste pa morali urediti datoteko configreal.php in spremeniti naslednje parametre
This avoids having to change all the other files that include /application/config/config.php, since config.php 're-directs them' towards the configuration file that is located in a non-web directory that includes all the real configuration information. However, you will need to edit configreal.php and change the follow parameters to use absolute directory paths to work properly:


<syntaxhighlight lang="php" enclose="div">
<syntaxhighlight lang="php" enclose="div">
Line 103: Line 95:
</syntaxhighlight>
</syntaxhighlight>


da lahko uporabite absolutno pot do imenika, ki bo pravilno delovala. Primer:
Example:


<syntaxhighlight lang="php" enclose="div">
<syntaxhighlight lang="php" enclose="div">
Line 117: Line 109:
</syntaxhighlight>
</syntaxhighlight>


Prav tako ne uporabljajte "admin" uporabnika za privzetega uporabnika. Pojdite v vašo MySQL podatkovno zbirko (ali drugo, če ste namestili  LimeSurvey na drugi podatkovni zbirki) in zamenjajte privzeto uporabniško ime "admin" na karkoli drugega, ki vam ustreza (na primer "admin_xyz"). Tako bo veliko težje uganiti novo skrbniško uporabniško ime. Vedite da je to eden od dveh podatkov, ki ju vsiljivci potrebujejo za pridobitev dostopa. Drugi podatke je skrbniško geslo, zato ga izberite zelo pazljivo.
Also, don't use "admin" as the default user. Go to your MySQL database (or the one in which you installed LimeSurvey on different database) and change default user name "admin" to whatever you prefer (e.g. "admin_xyz"). It will be now much harder to guess administrator's new user name. Remember, this is one of the two variables intruders can use to gain access. The admin password is the other variable. So choose both of them with extreme care.

Revision as of 17:05, 7 August 2017

Splošno

LimeSurvey relies on its own security, which is activated by default. The authors of this software takes no responsibility and makes no claims in relation to the appropriateness or the security level of this software. However, we take security issues very serious and react quickly - if you know of any security problems with LimeSurvey, please let us know either by sending us an e-mail at info@limesurvey.org or by opening a bug report in our bug tracker (please mark it as private).

Pravice na Linux-ovih datotekah

Če uporabljate Linux strežnik, so za zaščito vašega nameščenega LimeSurvay-a potrebne nastavitve ustreznih pravic na datotekah.

Osnovna dejstva o pravicah na Linux/*nix datotekah

Linux/*nix operacijski sistem je večuporabniški. To pomeni da poleg vašega osebnega računa lahko na sistemu obstajajo še drugi uporabniški računi in je potrebno paziti, kakšne pravice dajate ostalim uporabnikom.

Namig: Nastavljanje pravic na datotekah je še posebej pomembno pri zaščiti konfiguracijskih datotek, ki vsebujejo zelo kritične podatke kot so gesla.

Bear in mind that the 'root' account will always be granted permission to access your files (no matter what file permissions you set) as it is the super-admin user.

The web server (which runs LimeSurvey) is also running under a given identity (user). On Linux, this is usually the 'www', 'www-data' (on Debian/Ubuntu), 'apache' or 'nobody' user. However, some hosting companies use systems (such as suexec) that make possible the running of LimeSurvey scripts with your personal user. Of course, the web server user must have the right to read LimeSurvey files. However, only a small subset of LimeSurvey sub-directories must be writable by the web server user.

Hint: It is very valuable to revoke write permission for the web server user to these LimeSurvey sub-directories that do not require it. Indeed, even if a LimeSurvey vulnerability might be discovered, the main files will still be protected from an illicit modification thanks to the file system permissions.

Nastavljanje pravic nad datotekami na Linux-sistemu v lastnem upravljanju

If you're managing your web server and operating system configuration (you are the owner of the physical server or are renting a virtual server on which you have root access), you can follow the following the recommendations from below.

You can first set the owner and group of your LimeSurvey files so that it will ease the file permissions setup. A possible strategy is to set the owner of the LimeSurvey files to your personal username, and the group of the LimeSurvey files to the web server group. Usually, this web server group only contains the web server account (and possibly another webmaster account). For instance, if your username is 'myaccount' and the webserver user is 'apache' in the 'apache' group, then, from a shell access, you can use the following command: $ chown -R myaccount:apache limesurvey/. Then set the file and sub-directories permissions.

For the script to work properly, the write access to some directories is needed:

  • The /limesurvey/application/config directory requires Read & Write for saving the application configuration settings.
  • The "/limesurvey/tmp" directory and its sub-directories are used for imports/uploads and should be set to Read & Write for your web server.
  • The upload/directory and all its sub-directories must also have set Read & Write permissions in order to enable pictures and media files upload.
  • All other directories and files can be set to Read Only.
Namig: v kolikor boste upoštevali zgornja priporočila, lahko te nastavitve uveljavite z naslednjimi ukazi:

$ chmod -R o-r-w-x limesurvey/

$ chmod -R -w limesurvey/

$ chmod -R 770 limesurvey/application/config

$ chmod -R 770 limesurvey/tmp

$ chmod -R 770 limesurvey/upload

Setting file permissions on a hosted web server

Giving the difficulty of a standard procedure to secure a web application on a hosted environment, it is rather difficult because hosted environments differ in so many ways.

In the managed server case, the server needs write access to some directories in order for the script to work properly:

  • The "/limesurvey/tmp" directory is used for imports/uploads and should be set to Read & Write for your web server.
  • The upload/directory and all its sub-directories must also have Read & Write for your web server in order to enable pictures and media files upload.
  • The other directories and files should be set to Read Only.
Hint:
  • Depending on your web server configuration, you will have to chmod the rights on the writable folders to 755 or 777 to make it writable for the web server. Try 755 first, if it does not work, 'upgrade' to 777.
  • You can also try to remove other users' read access to config.php by setting this file's permissions to 750 - if it does not work, 'upgrade' to 755.

Pravice nad datotekami v okolju Windows

If you are using a Windows server, your should ensure that the admin folder allows the owner of the web server process to write files to this directory, The rest of the files can be set to read-only and execute.

Ostale varnostne zadeve

V nadaljevanju so le priporočila. Na splošno je LimeSurvey zelo varen tudi brez teh dodatnih ukrepov. Če zbirate zelo občutljive podatke, lahko ti manjši dodatni varnostni ukrepi precej pomagajo:

SSL usage

We generally recommend the usage of SSL for sensitive survey data. You usually enable SSL by configuring your web server correctly and using a SSQL certificate. If you have enabled SSL, you should enforce SSL all the time via the [Global settings] option of LimeSurvey. Additionally, you could set only to use 'secure' cookies by editing/adding the related option in config.php.

The access to the config.php file

  You must update application/config/config.php only after the first installation is done and it works.


The /application/config/config.php file contains a user name and password for your database server. This poses certain security issues, particularly if you are using a login that has high level administrative access to your database. In the event of some error returning the content of this PHP file to a user's browser, your database password and other details could be compromised (please note, that this is a very unlikely scenario). The best way to minimize risk is to set up a specific login that has specific rights only to your LimeSurvey database.

Another way to secure this information can be to put the certain information from the /application/config/config.php file in a non-web directory, i.e. for Apache users this is the directory above the htdocs (also known as public_html or www) folder. Basically, you will use config.php, but have one line in it - a line that includes the file with ACTUAL configuration information (ex: <?php return include("/home/hostfolder/safedata/configreal.php"); ?>). Remove all actual configuration information from /application/config/config.php and paste it into the other file (configreal.php) that is mentioned in the /application/config/config.php file. This other file should be located in a non-web directory. Then /application/config/config.php will not contain database passwords, etc. - just the name of the file that DOES contain the database info.

This avoids having to change all the other files that include /application/config/config.php, since config.php 're-directs them' towards the configuration file that is located in a non-web directory that includes all the real configuration information. However, you will need to edit configreal.php and change the follow parameters to use absolute directory paths to work properly:

'basePath' => dirname(dirname('''FILE''')),
'runtimePath' => dirname(dirname(dirname('''FILE'''))).DIRECTORY_SEPARATOR.'tmp'.DIRECTORY_SEPARATOR.'runtime',
[...]

'urlManager' => array(
   [...]
   'rules' => require('routes.php'),
   [...]
);

Example:

'basePath' => '/var/www/htdocs/limesurvey',
'runtimePath' => '/var/www/htdocs/limesurvey/tmp/runtime',
[...]

'urlManager' => array(
   [...]
   'rules' => require('/var/www/htdocs/limesurvey/config/routes.php'),
   [...]
);

Also, don't use "admin" as the default user. Go to your MySQL database (or the one in which you installed LimeSurvey on different database) and change default user name "admin" to whatever you prefer (e.g. "admin_xyz"). It will be now much harder to guess administrator's new user name. Remember, this is one of the two variables intruders can use to gain access. The admin password is the other variable. So choose both of them with extreme care.