summaryrefslogtreecommitdiffstats
path: root/docs/sgml/administration.sgml
diff options
context:
space:
mode:
authorbarnboy%trilobyte.net <>2001-04-26 10:51:39 +0200
committerbarnboy%trilobyte.net <>2001-04-26 10:51:39 +0200
commit4294a4f48a5949a181acb033e108a5ea897e1a3c (patch)
treefc368a2600d9881d7c32f59bfdc6b33564dde1c3 /docs/sgml/administration.sgml
parenta5fb063d01828306ae03f811988c68433b568544 (diff)
downloadbugzilla-4294a4f48a5949a181acb033e108a5ea897e1a3c.tar.gz
bugzilla-4294a4f48a5949a181acb033e108a5ea897e1a3c.tar.xz
Added .htaccess files for shadow/, data/, and /.
I added related information to the Bugzilla Guide, and tacked in a couple of last-minute additions. Also fixed the annoying "Tip: HINT:" thing.
Diffstat (limited to 'docs/sgml/administration.sgml')
-rw-r--r--docs/sgml/administration.sgml28
1 files changed, 26 insertions, 2 deletions
diff --git a/docs/sgml/administration.sgml b/docs/sgml/administration.sgml
index a35ba047d..8ca600c54 100644
--- a/docs/sgml/administration.sgml
+++ b/docs/sgml/administration.sgml
@@ -1049,14 +1049,38 @@ operating parameters for bugzilla.</PARA>
<LISTITEM>
<PARA>
Ensure you have adequate access controls for the $BUGZILLA_HOME/data/ and
- $BUGZILLA_HOME/shadow/ directories, as well as the $BUGZILLA_HOME/localconfig file.
+ $BUGZILLA_HOME/shadow/ directories, as well as the $BUGZILLA_HOME/localconfig and
+ $BUGZILLA_HOME/globals.pl files.
The localconfig file stores your "bugs" user password,
which would be terrible to have in the hands
- of a criminal. Also some files under $BUGZILLA_HOME/data/ store sensitive information, and
+ of a criminal, while the "globals.pl" stores some default information regarding your
+ installation which could aid a system cracker.
+ In addition, some files under $BUGZILLA_HOME/data/ store sensitive information, and
$BUGZILLA_HOME/shadow/ stores bug information for faster retrieval. If you fail to secure
these directories and this file, you will expose bug information to those who may not
be allowed to see it.
</PARA>
+ <NOTE>
+ <PARA>
+ Bugzilla provides default .htaccess files to protect the most common Apache
+ installations. However, you should verify these are adequate according to the site-wide
+ security policy of your web server, and ensure that the .htaccess files are
+ allowed to "override" default permissions set in your Apache configuration files.
+ Covering Apache security is beyond the scope of this Guide; please consult the Apache
+ documentation for details.
+ </PARA>
+ <PARA>
+ If you are using a web server that does not support the .htaccess control method,
+ <EMPHASIS>you are at risk!</EMPHASIS> After installing, check to see if you can
+ view the file "localconfig" in your web browser (ergo:
+ <ULINK URL="http://bugzilla.mozilla.org/localconfig">
+ http://bugzilla.mozilla.org/localconfig</ULINK>. If you can read the contents of this
+ file, your web server has not secured your bugzilla directory properly and you
+ must fix this problem before deploying Bugzilla. If, however, it gives you a
+ "Forbidden" error, then it probably respects the .htaccess conventions and you
+ are good to go.
+ </PARA>
+ </NOTE>
<PARA>
On Apache, you can use .htaccess files to protect access to these directories, as outlined
in <ULINK URL="http://bugzilla.mozilla.org/show_bug.cgi?id=57161">Bug 57161</ULINK> for the