Using Apache with Suexec on Linux - page 6
Executing CGI Scripts as Other Users
suexec-enable your Apache Web server, a lot
of behaviours change:
- CGI scripts in
ScriptAliased directories will be executed under the identity of the username specified in the
- CGI scripts in user directories (as specified by the
USERDIR_SUFFIXdefinition, set by the
--suexec-userdiroption) will be executed as the owning user if and only if
- the script was requested using the
- all of the ownership and permission requirements are met
~usernameURL format is used but the permissions/ownerships aren't correct, the result will be a '500 Internal Server Error' page, not the script being executed by the server user as in a non-
- the script was requested using the
- CGI scripts in all user directories accessed through
~usernameURLs will go through the
suexecprocess--even those that you didn't consider or expect.
One effect of these changes is that previously-functioning
user scripts may suddenly begin to fail, giving the visitor
the fatal '500 Internal Server Error' page, and giving you,
the Webmaster, an unrevealing "
Premature end of script
headers" message in the server error log. This is where it
becomes easy to get frustrated by simply forgetting to check
suexec error log.
Another aspect of the use of
suexec is that, if you
have virtual hosts with different
values, they cannot share
one of the requirements is that the script and the directory
must be owned by the user and group
suexec is being told
to use. So you may have to duplicate a lot of your
stuff into per-vhost directories that are owned and protected
Frequently Asked Suexec Questions
suexec wrapper isn't perfect, and some aspects
of its design result in it being less than ideally suited
to all environments. Here are some of the more common questions, changes,
and enhancements that come up again and again:
- The single
--suexec-docrootvalue is irksome. I have 50 virtual hosts with
/vhost2, and so on. The only way I can get
suexecto work with these is to use
--suexec-docroot=/, which hardly seems secure.
- This is unfortunately the way it is with the
suexecthat comes with Apache up through version 1.3.11. The value you specify for
--suexec-docrootmust be an ancestor of all of the non-
~usernamedocuments that use it. This restriction may be lifted in a future version, but even then it would require settings specified at compile-time, such as with something like
- I only want
suexecto be used in certain directories or user accounts.
- As of Apache 1.3.11,
suexecis an all-or-nothing proposition. If it's available and enabled, it will be used in all cases when a CGI script is invoked. A future version of Apache may provide a means of controlling this with greater granularity.
- Why don't the Apache CGI error messages say there's a
- Because Apache really doesn't know that for a fact.
All it knows is that called an internal function to invoke
the CGI, and the interaction with the script failed as
described in the error message. The error might have
been caused by a failure to meet
suexec's requirements, or it may have been the result of a bona fide error in the script itself.
- Why aren't
suexec's error messages logged in the Apache server log?
- In order for the messages from
suexecto appear in the main server's log, they would have to actually be passed to Apache so that Apache did the logging. Not only is this inappropriate for the Web server to do, but there would be additional confusion about into which error log the messages should go.
- Skip Ahead
- 1. Executing CGI Scripts as Other Users
- 2. Executing CGI Scripts as Other Users
- 3. Executing CGI Scripts as Other Users
- 4. Executing CGI Scripts as Other Users
- 5. Executing CGI Scripts as Other Users
- 6. Executing CGI Scripts as Other Users
- 7. Executing CGI Scripts as Other Users
- 8. Executing CGI Scripts as Other Users
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: CoreOS, Oracle Enterprise Linux 7 and Ubuntu 14.10
- 2Linux Top 3: Debian Dumps SPARC, Ubuntu Takes Over Linux 3.13 and the Core Infrastructure Initiative
- 3Linux Top 3: Fedora, Ubuntu and Gluster Lose Community Leaders
- 4Red Hat Enterprise Linux 7 Finally Hits the Big Time
- 5Linux Top 3: Tails 1.0, OpenMandriva Lx 2014.0 and Debian 7.5