<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: We are in San Antonio Texas</title>
	<atom:link href="http://joeltherien.com/blog/?feed=rss2&#038;p=8" rel="self" type="application/rss+xml" />
	<link>http://joeltherien.com/blog/?p=8</link>
	<description></description>
	<lastBuildDate>Wed, 10 Nov 2010 16:57:41 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0.1</generator>
	<item>
		<title>By: Troy</title>
		<link>http://joeltherien.com/blog/?p=8&#038;cpage=1#comment-50</link>
		<dc:creator>Troy</dc:creator>
		<pubDate>Mon, 12 Mar 2007 23:40:49 +0000</pubDate>
		<guid isPermaLink="false">http://joeltherien.com/blog/?p=8#comment-50</guid>
		<description>The first attack 10 days ago.

Now a fresh attack, the third in those 10 days.

I thought this was being addressed?

Still, I&#039;m getting quicker at fixing my infected files now. Perhaps I&#039;ll write a cron job to do it for me if it&#039;s going to be a weekly feature...

If this is only affecting 1% of your servers, why haven&#039;t you found any 777 files on those servers and changed their permissions? (If that&#039;s how the infection happens)

Oh, and some irony. A problem that started last Tuesday was finally fixed this morning (5 days of not being able to use phpMyAdmin) - today would have been the first time I&#039;ve been able to work on my database.

But of course phpMyAdmin is no longer usable again because this freakin vulnerability has trashed the cpanel files again.

I despair!</description>
		<content:encoded><![CDATA[<p>The first attack 10 days ago.</p>
<p>Now a fresh attack, the third in those 10 days.</p>
<p>I thought this was being addressed?</p>
<p>Still, I&#8217;m getting quicker at fixing my infected files now. Perhaps I&#8217;ll write a cron job to do it for me if it&#8217;s going to be a weekly feature&#8230;</p>
<p>If this is only affecting 1% of your servers, why haven&#8217;t you found any 777 files on those servers and changed their permissions? (If that&#8217;s how the infection happens)</p>
<p>Oh, and some irony. A problem that started last Tuesday was finally fixed this morning (5 days of not being able to use phpMyAdmin) &#8211; today would have been the first time I&#8217;ve been able to work on my database.</p>
<p>But of course phpMyAdmin is no longer usable again because this freakin vulnerability has trashed the cpanel files again.</p>
<p>I despair!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Daryl Austman</title>
		<link>http://joeltherien.com/blog/?p=8&#038;cpage=1#comment-43</link>
		<dc:creator>Daryl Austman</dc:creator>
		<pubDate>Wed, 07 Mar 2007 07:30:19 +0000</pubDate>
		<guid isPermaLink="false">http://joeltherien.com/blog/?p=8#comment-43</guid>
		<description>Joel, I will accept the fact that this attack is not exactly the same as the one on Hostgator, but they are very similar... you must admit.

Unfortunately you misunderstood me as I put NO blame on your staff. They do the absolute best job that they are capable of doing with the knowledge they have and with the time they are given to work on such tasks. 

Can you explain to me why PHPsuexec has NOT been put on the servers when it has been available for 2 yrs?

And is the problem seated more with an unpatched cPanel on an older machine with an older version of cPanel?

I&#039;ve been with Kiosk for over 8 yrs now, almost from the beginning of the company. I believed in the company, enjoyed the fact that you were Canadian based and loved the personal touch that you and your staff offered. I want to continue doing so.

Daryl Austman
www.greymouse.com</description>
		<content:encoded><![CDATA[<p>Joel, I will accept the fact that this attack is not exactly the same as the one on Hostgator, but they are very similar&#8230; you must admit.</p>
<p>Unfortunately you misunderstood me as I put NO blame on your staff. They do the absolute best job that they are capable of doing with the knowledge they have and with the time they are given to work on such tasks. </p>
<p>Can you explain to me why PHPsuexec has NOT been put on the servers when it has been available for 2 yrs?</p>
<p>And is the problem seated more with an unpatched cPanel on an older machine with an older version of cPanel?</p>
<p>I&#8217;ve been with Kiosk for over 8 yrs now, almost from the beginning of the company. I believed in the company, enjoyed the fact that you were Canadian based and loved the personal touch that you and your staff offered. I want to continue doing so.</p>
<p>Daryl Austman<br />
<a href="http://www.greymouse.com" rel="nofollow">http://www.greymouse.com</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Joel</title>
		<link>http://joeltherien.com/blog/?p=8&#038;cpage=1#comment-41</link>
		<dc:creator>Joel</dc:creator>
		<pubDate>Tue, 06 Mar 2007 12:58:35 +0000</pubDate>
		<guid isPermaLink="false">http://joeltherien.com/blog/?p=8#comment-41</guid>
		<description>Hi Troy

I agree, we tried that and it caused us a ton of headaches when people did not know how to change permissions to 755.  However, you are 150% correct, currently 50% are using phpsuexec and we will now enable it on all servers and then teach people how to fix their scripts.  We have always used suexec for cgi.  Thanks so much for your input

Joel

I would love to type more but, the internet at this Hotel in Texas is REALLY bad :-(</description>
		<content:encoded><![CDATA[<p>Hi Troy</p>
<p>I agree, we tried that and it caused us a ton of headaches when people did not know how to change permissions to 755.  However, you are 150% correct, currently 50% are using phpsuexec and we will now enable it on all servers and then teach people how to fix their scripts.  We have always used suexec for cgi.  Thanks so much for your input</p>
<p>Joel</p>
<p>I would love to type more but, the internet at this Hotel in Texas is REALLY bad <img src='http://joeltherien.com/blog/wp-includes/images/smilies/icon_sad.gif' alt=':-(' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Troy</title>
		<link>http://joeltherien.com/blog/?p=8&#038;cpage=1#comment-38</link>
		<dc:creator>Troy</dc:creator>
		<pubDate>Mon, 05 Mar 2007 15:16:19 +0000</pubDate>
		<guid isPermaLink="false">http://joeltherien.com/blog/?p=8#comment-38</guid>
		<description>Why don&#039;t kiosk use suexec? Wouldn&#039;t it sort our problems? I don&#039;t want to say too much on a public forum and feel free to delete this comment once noted :-) but isn&#039;t the problem that everyone on the same server runs as the same user group (including cpanel?)

(from http://www.hostmagik.info/phpsuexec.php)

PHP as a CGI with Suexec

When PHP runs as a CGI with Suexec, PHP files work under your user/group. PHP files no longer require loose permissions to function, now they will require strict permissions. Setting your directories or PHP files to 777 will cause them to produce a 500 Internal Server Error, this happens to protect your PHP files from being abused by outside sources.

Under PHPSuexec your directories and PHP files can have permissions no greater than 755 (read/write/execute by your username, read/execute by group/world). Since you own your files, your scripts can function in any directory your user has created and can&#039;t be manipulated by any outside users, including &quot;nobody&quot;.

Now, when a PHP file creates or uploads a new file under your account, the new file will be owned by your username. You will no longer have to worry about the webserver taking over your files and even more important, you will no longer have to worry about a stranger reading or writing to your files either!</description>
		<content:encoded><![CDATA[<p>Why don&#8217;t kiosk use suexec? Wouldn&#8217;t it sort our problems? I don&#8217;t want to say too much on a public forum and feel free to delete this comment once noted <img src='http://joeltherien.com/blog/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' />  but isn&#8217;t the problem that everyone on the same server runs as the same user group (including cpanel?)</p>
<p>(from <a href="http://www.hostmagik.info/phpsuexec.php)" rel="nofollow">http://www.hostmagik.info/phpsuexec.php)</a></p>
<p>PHP as a CGI with Suexec</p>
<p>When PHP runs as a CGI with Suexec, PHP files work under your user/group. PHP files no longer require loose permissions to function, now they will require strict permissions. Setting your directories or PHP files to 777 will cause them to produce a 500 Internal Server Error, this happens to protect your PHP files from being abused by outside sources.</p>
<p>Under PHPSuexec your directories and PHP files can have permissions no greater than 755 (read/write/execute by your username, read/execute by group/world). Since you own your files, your scripts can function in any directory your user has created and can&#8217;t be manipulated by any outside users, including &#8220;nobody&#8221;.</p>
<p>Now, when a PHP file creates or uploads a new file under your account, the new file will be owned by your username. You will no longer have to worry about the webserver taking over your files and even more important, you will no longer have to worry about a stranger reading or writing to your files either!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Joel Therien</title>
		<link>http://joeltherien.com/blog/?p=8&#038;cpage=1#comment-37</link>
		<dc:creator>Joel Therien</dc:creator>
		<pubDate>Mon, 05 Mar 2007 13:30:45 +0000</pubDate>
		<guid isPermaLink="false">http://joeltherien.com/blog/?p=8#comment-37</guid>
		<description>Hi Troy

This is what makes it so difficult.  If even just one php file is 777 on the whole server then it creates a hole for everyone.  Our team is making a software now to automatically change all permissions that are insecure to 644.  Im getting an update now from them while in Texas, I will post againhere soon.

Thanks so much for your patience on this

Joel</description>
		<content:encoded><![CDATA[<p>Hi Troy</p>
<p>This is what makes it so difficult.  If even just one php file is 777 on the whole server then it creates a hole for everyone.  Our team is making a software now to automatically change all permissions that are insecure to 644.  Im getting an update now from them while in Texas, I will post againhere soon.</p>
<p>Thanks so much for your patience on this</p>
<p>Joel</p>
]]></content:encoded>
	</item>
</channel>
</rss>
