Secure file permissions: Difference between revisions
No edit summary |
|||
Line 24: | Line 24: | ||
[[File:uploads_dropdown.png]] | [[File:uploads_dropdown.png]] | ||
[[File:uploads_attrs.png]] | [[File:uploads_attrs.png]] | ||
[[Category:Files]] | [[Category:Files]] | ||
[[Category:Security & anti-spam]] | [[Category:Security & anti-spam]] |
Revision as of 00:51, 1 December 2020
PHP code is run with PHP-FPM as your ULYSSIS user. This means you can tighten up you website's security by denying other users the permission to read your PHP files. However, due to the way the Apache webserver works, it must be able to determine the existence of your PHP files. Non-PHP files in your www directory must remain readable by other users, because Apache reads these as it's own user.
Recommended permissions
- Homedirectory: See homedirectory
- www directory (and other directories from where websites are served), including subdirectories:
0705/drwx---r-x
- Static website files (css, images, html, ...):
0604/-rw----r--
- Configuration files containing secrets/passwords:
0600/-rw-------
- Other directories and files that are not part of a website:
0600/-rw-------
or0700/-rwx------
Securing database login info
Suppose you have a file called config.php
, containing login information for your database. To secure this information, you can make it readable and writeable by only you, and nobody else using chmod 600 config.php
. In FileZilla, you can do this by right-clicking on the config file, clicking on "File permissions...", and changing the permissions according to the following screenshots:
Securing uploads directory
Also, if there are directories that you made writeable by others, e.g. an uploads folder, this is no longer necessary. If this directory is called uploads
, you can remove write rights for others with chmod go-w uploads
. In FileZilla, you can do this by right-clicking on the config file, clicking on "File permissions...", and changing the permissions according to the following screenshots: