Home Web Front-end JS Tutorial Improve PHP security: 8 PHP default configurations that must be modified_javascript skills

Improve PHP security: 8 PHP default configurations that must be modified_javascript skills

May 16, 2016 pm 04:31 PM
php security

Obviously, PHP Mysql Apache is a very popular web technology. This combination is powerful, scalable, and free. However, PHP's default settings are not so suitable for already online websites. Let's strengthen PHP's security policy by modifying the default configuration file!

0x01: Disable remote url file processing function

The file processing function like fopen accepts the rul parameter of the file (for example: fopen('http://www.yoursite.com','r')).). This function can easily access remote resources. However, this is a very important security threat. It is a good choice to disable this feature to limit the file function. Make the following changes in the php.ini file:

Copy code The code is as follows:

allow_url_fopen = Off

0x02: Disable registration of global variables

In versions before 4.2.0, PHP uses global variables as input. This function is called register_globals. It causes a lot of security problems in web applications because it allows attackers to easily manipulate global variables in some situations. , fortunately this feature is disabled by default in 4.2.0. It is very dangerous and must be disabled under any circumstances. If some scripts require this functionality, then the script has a potential security threat. Modify pnp.ini to disable this feature:

Copy code The code is as follows:

register_globals = Off

0x03: Limit PHP read and write operations

In many web development processes, php scripts need to read and write to the local file system, such as /var/www/htdocs/files. In order to enhance security, you can modify the read and write permissions of local files:

Copy code The code is as follows:

open_basedir = /var/www/htdocs/files

0x04: Posing Limit

Limiting PHP’s execution time, memory usage, post and upload data is the best strategy. You can configure it as follows:

Copy code The code is as follows:

max_execution_time = 30 ; Max script execution time
max_input_time = 60 ; Max time spent parsing input
memory_limit = 16M ; Max memory used by one script
upload_max_filesize = 2M ; Max upload file size
post_max_size = 8M ; Max post size

0x05: Disable error messages and enable logging

In the default setting, PHP will output an error message to the browser. During the development process of the application, this default setting is the most reasonable configuration. However, it can also leak some security information to the user, such as the installation path and username. In already developed websites, it is best to disable error messages and output error messages to a log file.

Copy code The code is as follows:

display_errors = Off
log_errors = On

0x06: Hide PHP file

If there is no hidden PHP file, we can obtain the server PHP version through various methods, such as using: http://www.example.com/script.php?=PHPB8B5F2A0-3C92-11d3-A3A9- 4C7B08C10000

Obviously, we don’t want users to be able to directly obtain the PHP version of your website server. Fortunately, there is a switch in php.ini to disable this feature:

Copy code The code is as follows:

expose_php = Off

0x07: Safe mode configuration

By default, PHP can be configured in safe mode. In this mode, Apache prohibits access to files, environment variables and binary programs. In safe mode, the biggest problem is that only the owner of the file can access This is a PHP file. If there are many developers working together to develop this program, this setting is impractical. When you need to access a PHP file, you need to modify the owner of the file. Another problem is that other programs cannot access these. PHP file, the following configuration can modify the permissions of the file to the user group instead of a single user.

Copy code The code is as follows:

safe_mode = Off
safe_mode_gid = On

By enabling safe_mode_gid, this group using Apache will be able to access PHP files. Safe mode is also very effective at preventing binaries from executing, however, developers may want to be able to run some binaries under certain circumstances. In these special cases, the binary files can be placed in a directory, such as (/var/www/binaries), and the following settings can be made:

Copy code The code is as follows:

safe_mode_exec_dir = /var/www/binaries

Finally, through the following settings, you can access the server's environment variables, provide a prefix separated by "_", so that only environment variables with the specified prefix can be accessed:

Copy code The code is as follows:

safe_mode_allowed_env_vars = PHP_

0x08: Restrict public user access to files with specific suffixes

Due to security reasons, many files with specific suffix names cannot be accessed by public users, such as files with the .inc suffix, which contain some sensitive information, such as mysql connection information. If there is no appropriate configuration, then every Every user can access this configuration file. In order to enhance the security of the website, you need to configure the following in the ..htaccess file:

Copy code The code is as follows:


Order allow,deny
Deny from all

0x09: Summary

The default configuration of PHP is for developers. If the website is for a large number of users, it is recommended to reconfigure PHP.

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

PHP security protection: Prevent identity forgery attacks PHP security protection: Prevent identity forgery attacks Jun 24, 2023 am 11:21 AM

With the continuous development of the Internet, more and more businesses involve online interactions and data transmission, which inevitably causes security issues. One of the most common attack methods is identity forgery attack (IdentityFraud). This article will introduce in detail how to prevent identity forgery attacks in PHP security protection to ensure better system security. What is an identity forgery attack? Simply put, an identity forgery attack (IdentityFraud), also known as impersonation, refers to standing on the attacker’s side

Security Auditing Guide in PHP Security Auditing Guide in PHP Jun 11, 2023 pm 02:59 PM

As web applications become more popular, security auditing becomes more and more important. PHP is a widely used programming language and the basis for many web applications. This article will introduce security auditing guidelines in PHP to help developers write more secure web applications. Input Validation Input validation is one of the most basic security features in web applications. Although PHP provides many built-in functions to filter and validate input, these functions do not fully guarantee the security of the input. Therefore, developers need

Avoid security risks of cross-site scripting attacks in PHP language development Avoid security risks of cross-site scripting attacks in PHP language development Jun 10, 2023 am 08:12 AM

With the development of Internet technology, network security issues have attracted more and more attention. Among them, cross-site scripting (XSS) is a common network security risk. XSS attacks are based on cross-site scripting. Attackers inject malicious scripts into website pages to obtain illegal benefits by deceiving users or implanting malicious code through other methods, causing serious consequences. However, for websites developed in PHP language, avoiding XSS attacks is an extremely important security measure. because

How to address security vulnerabilities and attack surfaces in PHP development How to address security vulnerabilities and attack surfaces in PHP development Oct 09, 2023 pm 09:09 PM

How to solve security vulnerabilities and attack surfaces in PHP development. PHP is a commonly used web development language. However, during the development process, due to the existence of security issues, it is easily attacked and exploited by hackers. In order to keep web applications secure, we need to understand and address the security vulnerabilities and attack surfaces in PHP development. This article will introduce some common security vulnerabilities and attack methods, and give specific code examples to solve these problems. SQL injection SQL injection refers to inserting malicious SQL code into user input to

PHP security protection: Prevent malicious BOT attacks PHP security protection: Prevent malicious BOT attacks Jun 24, 2023 am 08:19 AM

With the rapid development of the Internet, the number and frequency of cyber attacks are also increasing. Among them, malicious BOT attack is a very common method of network attack. It obtains website background login information by exploiting vulnerabilities or weak passwords, and then performs malicious operations on the website, such as tampering with data, implanting advertisements, etc. Therefore, for websites developed using PHP language, it is very important to strengthen security protection measures, especially in preventing malicious BOT attacks. 1. Strengthen password security. Password security is to prevent malicious BOT attacks.

Best Practices for PHP and Typecho: Building a Safe and Reliable Website System Best Practices for PHP and Typecho: Building a Safe and Reliable Website System Jul 21, 2023 am 10:42 AM

Best Practices for PHP and Typecho: Building a Safe and Reliable Website System [Introduction] Today, the Internet has become a part of people's lives. In order to meet user needs for websites, developers need to take a series of security measures to build a safe and reliable website system. PHP is a widely used development language, and Typecho is an excellent blogging program. This article will introduce how to combine the best practices of PHP and Typecho to build a safe and reliable website system. 【1.Input Validation】Input validation is built

PHP security protection: avoid DDoS attacks PHP security protection: avoid DDoS attacks Jun 24, 2023 am 11:21 AM

With the rapid development of Internet technology, website security issues are becoming more and more important. DDoS attacks are one of the most common security threats, especially for websites using PHP language, because PHP, as a dynamic language, is vulnerable to different forms of attacks. This article will introduce some PHP website protection techniques to help website administrators reduce the risk of DDoS attacks. 1. Using CDN (Content Delivery Network) CDN can help website administrators distribute website content and store static resources in the CDN cache to reduce

Security Vulnerabilities and Solutions in PHP Development Security Vulnerabilities and Solutions in PHP Development May 09, 2024 pm 03:33 PM

Security Vulnerabilities and Solutions in PHP Development Introduction PHP is a popular server-side scripting language that is widely used in web development. However, like any software, PHP has some security vulnerabilities. This article will explore common PHP security vulnerabilities and their solutions. Common PHP security vulnerability SQL injection: allows an attacker to access or modify data in the database by entering malicious SQL code into a web form or URL. Cross-site scripting (XSS): allows an attacker to execute malicious script code in the user's browser. File Contains: Allows an attacker to load and execute remote files or sensitive files on the server. Remote Code Execution (RCE): allows attackers to execute arbitrary

See all articles