472,124 Members | 1,425 Online
Bytes | Software Development & Data Engineering Community
Post +

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 472,124 software developers and data experts.

Database password security

Why is it advisable to place scripts which contain details of your
login and password outside of the publicly accessible web area on your
server.
Surely if the files that contain the details are given a php extension
then no-one can get at the information contained by these files even
if they point their browsers directly at the correct named file,
because apache will parse the php file before it is sent.

i.e.

if the file is called options.php and it resides in the web root
directory and contains the following ;-

<?php

define('DBUSER', 'Username') ;
define('DBPASS', 'Password123') ;

?>

If a web user points their browser directly at this page they will
just get a blank page - is there another way of gaining access to the
contents of this file that I am overlooking ?

tia
smartbloke
Jul 17 '05 #1
10 2760
SmartBloke wrote:
Surely if the files that contain the details are given a php extension
then no-one can get at the information contained by these files even
if they point their browsers directly at the correct named file,
because apache will parse the php file before it is sent.


During an upgrade a sysadmin, or you, on your server accidentally
forgets to put the LoadModule directive in apache.conf, say for an hour
or so.

During that hour any visitors to your website are treated with the
source code to your page, including all database schema information,
passwords, etc.

Even if it's only 5 minutes, at least one person is bound to see the
sensitive information. It's just safer to keep it out of the publicly
accessible directories.

--
Jasper Bryant-Greene
Cabbage Promotions
Jul 17 '05 #2
.oO(SmartBloke)
Why is it advisable to place scripts which contain details of your
login and password outside of the publicly accessible web area on your
server.
It's advisable to put _all_ scripts outside the document root:

* No one is able to call them from the outside.
* No one is able to call scripts out of context, which may lead to
strange results and error messages.
* You don't have to worry about filename extensions, don't have to use
.php all the time.
Surely if the files that contain the details are given a php extension
then no-one can get at the information contained by these files even
if they point their browsers directly at the correct named file,
because apache will parse the php file before it is sent.


I wouldn't be too sure about that. It's always possible that the server
"forgets" to parse a file (configuration error, maintenance, ...).

Micha
Jul 17 '05 #3
In article <e6********************************@4ax.com>, Michael Fesser wrote:
.oO(SmartBloke)
Why is it advisable to place scripts which contain details of your
login and password outside of the publicly accessible web area on your
server.
It's advisable to put _all_ scripts outside the document root:
No it's not. Allthough i see reasons not to put files containing
credentials in a public area.

* No one is able to call them from the outside.
If it was impossible or unwanted to call scripts from the outside, why
would there be scripts in the first place? Because we want people to
call some scripts. (And those we don't want them to call, we should not
make public)

* No one is able to call scripts out of context, which may lead to
strange results and error messages.
Actually, this depends totally on how the scripts are designed. If they
are well-designed, they will know when they are expected to be executed
(and when they should dispatch controll to another script).

But there is no relationship between knowledge about their context, and
the place where they are (public vs non-public area)

* You don't have to worry about filename extensions, don't have to use
.php all the time.


Again, this is true for both public as non-public areas. And thus not a
good reason to put them outside the public area.

--
Tim Van Wassenhove <http://home.mysth.be/~timvw>
Jul 17 '05 #4
.oO(Tim Van Wassenhove)
* No one is able to call them from the outside.


If it was impossible or unwanted to call scripts from the outside, why
would there be scripts in the first place?


I was referring to scripts performing backend tasks, initialization,
database queries, form processing, calculations etc., in other words all
the "application logic" or whatever you like to call it. Of course the
scripts representing webpages have to be accessible.
* No one is able to call scripts out of context, which may lead to
strange results and error messages.


Actually, this depends totally on how the scripts are designed. If they
are well-designed, they will know when they are expected to be executed
(and when they should dispatch controll to another script).


Do you know for all of your scripts how they will react if they are
called directly? Even if you put everything in classes and functions,
there may still be unresolved dependencies because the script was not
called from within another it depends upon. I have many scripts that
call methods of a global application object. If this object is not
available it'll rain error messages. I avoid such trouble with simply
making them not available to the public. All application and library
stuff is outside the document root.
* You don't have to worry about filename extensions, don't have to use
.php all the time.


Again, this is true for both public as non-public areas. And thus not a
good reason to put them outside the public area.


An often heard "security" argument is to give scripts the extension .php
so the server would always parse them (.inc files would be delivered as
plain text for example in most cases). Outside the document root the
filename simply doesn't matter, because it's out of reach of the
webserver and the PHP interpreter doesn't care about filenames.

Micha
Jul 17 '05 #5
In article <4p********************************@4ax.com>, Michael Fesser wrote:
.oO(Tim Van Wassenhove)
* No one is able to call them from the outside.
If it was impossible or unwanted to call scripts from the outside, why
would there be scripts in the first place?


I was referring to scripts performing backend tasks, initialization,
database queries, form processing, calculations etc., in other words all
the "application logic" or whatever you like to call it. Of course the
scripts representing webpages have to be accessible.


Although you cutted it away, you said and i quote:
It's advisable to put _all_ scripts outside the document root:

That made me think you were not only referring to scripts performing backend
tasks...
* No one is able to call scripts out of context, which may lead to
strange results and error messages.


Actually, this depends totally on how the scripts are designed. If they
are well-designed, they will know when they are expected to be executed
(and when they should dispatch controll to another script).


Do you know for all of your scripts how they will react if they are
called directly? Even if you put everything in classes and functions,
there may still be unresolved dependencies because the script was not
called from within another it depends upon. I have many scripts that
call methods of a global application object. If this object is not
available it'll rain error messages. I avoid such trouble with simply
making them not available to the public.


Here i think you're just handling the unwanted results and not the causes.

If the script is designed well, it can detect if it's expected to run.
And it can perform data validation. And it can redirect the user to the
right script (Or at least die and log the error) instead of thrashing the database.

All application and library
stuff is outside the document root.


I agree :)
* You don't have to worry about filename extensions, don't have to use
.php all the time.


Again, this is true for both public as non-public areas. And thus not a
good reason to put them outside the public area.


An often heard "security" argument is to give scripts the extension .php
so the server would always parse them
(.inc files would be delivered as
plain text for example in most cases).


There are more things that i hear often, although i not agree with them.

Imho a file that contains credentials, should not be in a public place.
It doesn't even matter if it's name ends with .php and is likely to be
interpreted by PHP before being shown. Blame it on Murphy :)

--
Tim Van Wassenhove <http://home.mysth.be/~timvw>
Jul 17 '05 #6
.oO(Tim Van Wassenhove)
Although you cutted it away, you said and i quote:
It's advisable to put _all_ scripts outside the document root:

That made me think you were not only referring to scripts performing backend
tasks...
Yep, my fault, was misleading. Sorry.
Here i think you're just handling the unwanted results and not the causes.

If the script is designed well, it can detect if it's expected to run.
And it can perform data validation. And it can redirect the user to the
right script (Or at least die and log the error) instead of thrashing the database.
I'm talking about the backend. ;)

The scripts (class definitions for example) don't know anyhing about
webpages, users or whatever. They are just used and instantiated from
within other scripts, but they have to be sure that some other scripts
or objects they rely on are already loaded or instantiated. It wouldn't
make sense to implement some detection mechanismn to avoid direct calls
in this case, the overhead and performance hit would be too heavy I
think (and I can't think of an easy way to do it at the moment).
Imho a file that contains credentials, should not be in a public place.
It doesn't even matter if it's name ends with .php and is likely to be
interpreted by PHP before being shown. Blame it on Murphy :)


ACK

The more important the file content is, the more likely the server will
fail and not only show the file in plain text to all visitors, but also
replace all pages on that site with the confidential file to reach the
maximum audience and mail it to AOL ... SCNR

Micha
Jul 17 '05 #7
JV
Please forgive me for sounding like a noob about this, but I kinda am new to
apache w/ php mod.
"Michael Fesser" <ne*****@gmx.net> wrote in message
news:e6********************************@4ax.com..
<snip>
It's advisable to put _all_ scripts outside the document root:

<snip>

where is a safe place to put such script files that the apache server is
still capable of accessing them?

and how do u include the files if they are outside the document root scope ?

JV
Jul 17 '05 #8
"SmartBloke" <sm********@mail.com> wrote in message
news:e9**************************@posting.google.c om...
Why is it advisable to place scripts which contain details of your
login and password outside of the publicly accessible web area on your
server.


It's largely pointless from a practical point of view. The database
login/password doesn't buy your much, since databases are rarely set up to
accept connect from anywhere.

It's the kind of things that people who think they know security (but really
do not) do.
Jul 17 '05 #9

"JV" <jveil.hotpop@com> wrote in message
news:spt%c.144814$Fg5.63485@attbi_s53...
Please forgive me for sounding like a noob about this, but I kinda am new
to
apache w/ php mod.
"Michael Fesser" <ne*****@gmx.net> wrote in message
news:e6********************************@4ax.com..
<snip>
It's advisable to put _all_ scripts outside the document root:

<snip>

where is a safe place to put such script files that the apache server is
still capable of accessing them?

and how do u include the files if they are outside the document root scope
?

JV


Via the include_path directive in the php.ini file. In my case I have a
directory called "includes" which is outside the document root, therefore
inaccessible from any URL. When a script contains include('filename.inc')
PHP will first look in the current working directory. If the file exists
there it will be used from there. If it does not exist there then PHP will
look in each of the directories specified on the include_path directive
until it gets a hit. Simple, isn't it?

If you do not have access to the php.ini file then you can modify the
include_path directive in any of the following ways:

(a) If your web server is Apache you can create a .htaccess file containing
the following:

php_value include_path "...."

Note that the format of the string varies between Windows and Unix.

(b) Within a PHP script you can use the ini_set() function to supply a new
value for include_path.

Hope this helps.

--
Tony Marston

http://www.tonymarston.net

Jul 17 '05 #10
.oO(JV)
"Michael Fesser" <ne*****@gmx.net> wrote in message
news:e6********************************@4ax.com ..
<snip>
It's advisable to put _all_ scripts outside the document root:<snip>

where is a safe place to put such script files that the apache server is
still capable of accessing them?


My "all" was misleading, I was referring to scripts that are not meant
to be called directly in a browser (the "application logic").
and how do u include the files if they are outside the document root scope ?


PHP doesn't care about the webserver's document root, it accesses and
includes the files directly through the filesystem.

Micha
Jul 17 '05 #11

This discussion thread is closed

Replies have been disabled for this discussion.

Similar topics

12 posts views Thread by Pat A | last post: by
4 posts views Thread by Ant | last post: by
12 posts views Thread by mistral | last post: by

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.