Jump to content

Recommended Posts

My php app allows users to store files on my server.  Each user has their own directory on apache where the files go.  Currently I have this directive:

 

 Options MultiViews -Indexes SymLinksIfOwnerMatch IncludesNoExec

 

Which gives the user a forbidden error if they were to try to navigate to www.example.com/user/ted.  Is this the best way to do this or should I be doing this a more elegant way?  While this is ok security I guess a program could be written that brute forced http requests like www.example.com/user/ted/file.zip ... file2.zip ... file3.zip etc and eventually it could download a file.  So what are best practices on making this more secure?

 

Anyways I'd appreciate your thoughts on this matter.

Link to comment
https://forums.phpfreaks.com/topic/38441-apache-directory-security-best-practices/
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.