{"id":8417,"date":"2016-06-17T21:38:20","date_gmt":"2016-06-17T20:38:20","guid":{"rendered":"https:\/\/wp.okra.host\/article\/understanding-fortification\/"},"modified":"2021-03-07T14:11:27","modified_gmt":"2021-03-07T13:11:27","slug":"understanding-fortification","status":"publish","type":"ht_kb","link":"https:\/\/kb.okra.host\/de\/article\/understanding-fortification\/","title":{"rendered":"Understanding fortification"},"content":{"rendered":"<h2 id=\"overview\" >\u00dcbersicht<\/h2>\n<p>Fortification Mode is a new feature introduced in apnscp as of <a href=\"http:\/\/updates.apnscp.com\/2016\/05\/one-clicks-are-back\/\">May 2016<\/a>. Fortification simplifies permission management for PHP-based applications, which run as a separate user from the account holder to enhance site security. Fortification mode is done within the control panel on a <a href=\"https:\/\/kb.okra.host\/de\/control-panel\/detecting-a-web-application\/\">known application<\/a> via <strong>Web<\/strong> &gt; <strong>Web Apps<\/strong>.<\/p>\n<p>When disabled, fortification mode allows write-access to any file under the <a href=\"https:\/\/kb.okra.host\/de\/web-content\/where-is-site-content-served-from\/\">Dokumentenstamm<\/a> of a hosted domain or subdomain. This is analogous to running the web application under your user account. When fortification is enabled, write-access is permitted to only select locations of a web application. Unless fortification permits it, the web application may not write to the destination.<\/p>\n<p><a href=\"https:\/\/kb.okra.host\/wp-content\/uploads\/2016\/06\/fortification-mode.png\" rel=\"attachment wp-att-1302 lightbox-0\" data-lbwps-width=\"455\" data-lbwps-height=\"396\" data-lbwps-srcsmall=\"https:\/\/kb.okra.host\/wp-content\/uploads\/2016\/06\/fortification-mode.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-1302\" src=\"https:\/\/kb.okra.host\/wp-content\/uploads\/2016\/06\/fortification-mode.png\" alt=\"fortification-mode\" width=\"455\" height=\"396\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2 id=\"benefits-of-fortification\" >Benefits of Fortification<\/h2>\n<p>Fortification yields two benefits:<\/p>\n<p>First, in the event that your site is <a href=\"https:\/\/kb.okra.host\/de\/platform\/handling-a-hijacked-account\/\">hacked<\/a>, the attacker has limited mobility. Backdoors are frequently\u00a0installed in system files that give the attacker multiple methods of re-entry once the initial ingress point has been secured (often, outdated software installed on that web site). Unless\u00a0fortification explicitly permits write-access to those files, an attacker cannot install a backdoor. Those access points that the web application may write, e.g. \/wp-content\/uploads for WordPress or \/administrator\/cache in Joomla, are further limited by our security policies to disallow public access or serve only static content such as\u00a0images, movies, or downloadable files.<\/p>\n<p>Second, if a breach were to occur,\u00a0running as a secondary user limits the scope of damage. An attacker is unable to snoop through your email, compromise your ssh keys, or gain access to the control panel. Damage is superficial at best. In addition, because these files are flagged with web application as its creator\/owner, it makes audit trails very easy to establish allowing for us to quickly inoculate your site.<\/p>\n<p><em>But<\/em>, please &#8211; do stay on top of updates for your applications. Fortification is a feature to help keep your account secure, but it does not keep your account secure. Judicious use of third-party plugins, software updates, and strong passwords do. We cover <strong>automatic updates<\/strong> for WordPress, Joomla!, Drupal, and Magento, but there are thousands of web applications that users opt to install that are not enrolled in our automatic update program. Every time your account is compromised, a $15 fee is charged to the account.<\/p>\n<h2 id=\"fortification-modes\" >Fortification Modes<\/h2>\n<p>Applications support a variety of fortification modes depending upon what support is provided in the control panel codebase. Only Learning Mode is enabled for unknown applications. For other supported applications, the following three fortification modes apply.<\/p>\n<p><strong>Learning Mode<\/strong>:\u00a0if an application is not recognized or has not been <a href=\"https:\/\/kb.okra.host\/de\/control-panel\/detecting-a-web-application\/\">previously detected<\/a>, then Learning Mode is enabled. Learning Mode\u00a0allows 100% write-access to the document root. After 30 minutes, a background task calculates what files have been modified, then establishes a fortification\u00a0personality for that web site. Only files created or modified during that window will be allowed future write-access.<\/p>\n<p><strong>Fortification On (MIN)<\/strong>: Minimum Fortification allows the greatest degree of freedom by the web application to write to and modify files. When enabled, you should never be prompted to change permissions on any files. Consequently, an attacker will have access to modify more files, including vital system files and potentially alter your <a href=\"https:\/\/kb.okra.host\/de\/guides\/htaccess-guide\/\">.htaccess<\/a> file &#8211; if present &#8211; to alter the way in which your web site is handled by the server.<\/p>\n<p><strong>Fortification On<\/strong>: Normal Fortification is the maximum reasonable fortification for a web site as established by our development team. You may need to alter permissions of files (or enable <em>Web App Write Mode<\/em>)\u00a0to allow write-access in extreme situations, such as installing a new plugin or updating the application\u00a0system files from its built-in update panel if supported by the web app and not supported by the control panel. Most paths are also filtered to serve assets as-is reducing the ability a hacker has to leverage secondary backdoors installed once the site becomes compromised.<\/p>\n<p><strong>Web App Write Mode<\/strong>: Web App Write Mode releases fortification on a 10 minute timer. After 10 minutes has elapsed, Normal Fortification is enabled. This is useful in situations where new plugins are installed or in-place updates are performed.<\/p>\n<p><strong>Release Fortification:<\/strong> disable fortification on the web app entirely and allow write-access to every file on the site to the web application. Typically\u00a0<span style=\"color: #993300\"><em>very dangerous<\/em>.<\/span><\/p>\n<h2 id=\"fortification-visualized\" >Fortification\u00a0Visualized<\/h2>\n<p>The following diagram illustrates normal, min, and released fortification modes for WordPress.<\/p>\n<p><a href=\"https:\/\/kb.okra.host\/wp-content\/uploads\/2016\/06\/fortification-diagram-2.png\" rel=\"attachment wp-att-1314 lightbox-1\" data-lbwps-width=\"742\" data-lbwps-height=\"965\" data-lbwps-srcsmall=\"https:\/\/kb.okra.host\/wp-content\/uploads\/2016\/06\/fortification-diagram-2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-1314\" src=\"https:\/\/kb.okra.host\/wp-content\/uploads\/2016\/06\/fortification-diagram-2.png\" alt=\"fortification diagram-2\" width=\"742\" height=\"965\" \/><\/a><\/p>\n<h2 id=\"see-also\" >Siehe auch<\/h2>\n<ul>\n<li><a href=\"https:\/\/apnscp.com\/php-fortification\">Fortification<\/a> (apnscp.com)<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Overview Fortification Mode is a new feature introduced in apnscp as of May 2016. Fortification simplifies permission management for PHP-based applications, which run as a separate user from the account holder to enhance site security. Fortification mode is done within the control panel on a known application via Web &gt;&#8230;<\/p>","protected":false},"author":1,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[56],"ht-kb-tag":[],"class_list":["post-8417","ht_kb","type-ht_kb","status-publish","format-standard","has-post-thumbnail","hentry","ht_kb_category-control-panel"],"_links":{"self":[{"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/ht-kb\/8417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/comments?post=8417"}],"version-history":[{"count":2,"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/ht-kb\/8417\/revisions"}],"predecessor-version":[{"id":8421,"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/ht-kb\/8417\/revisions\/8421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/media\/8419"}],"wp:attachment":[{"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/media?parent=8417"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/ht-kb-category?post=8417"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/kb.okra.host\/de\/wp-json\/wp\/v2\/ht-kb-tag?post=8417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}