Difference between revisions of "Apache 2"

 
(54 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
[[Category:Linux]]
 +
 +
 +
 
=Requirements=
 
=Requirements=
 +
 
Before going through this tutorial, I recommend you to setup:
 
Before going through this tutorial, I recommend you to setup:
 
* [[MySQL server]]
 
* [[MySQL server]]
 
* [[SSL server]]
 
* [[SSL server]]
 
* [[LDAP server]]
 
* [[LDAP server]]
 +
 +
 +
  
 
=Installation=
 
=Installation=
Line 12: Line 20:
 
This will install web server + PHP + Perl + all required libraries.
 
This will install web server + PHP + Perl + all required libraries.
  
Apache2 core
+
===Apache2 core===
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
apt-get install apache2 apache2-mpm-prefork apache2-utils ssl-cert
+
apt install apache2 apache2-utils  
 +
apt install ssl-cert
 
</syntaxhighlight>
 
</syntaxhighlight>
  
Additional libraries
+
Since Ubuntu 16.04 <code>apache2-mpm-prefork</code> is not required
 +
 
 +
===Doc===
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
apt-get install libapache2-mod-fcgid libruby
+
apt install apache2-doc
 
</syntaxhighlight>
 
</syntaxhighlight>
  
Doc
 
 
<syntaxhighlight lang="bash">
 
apt-get install apache2-doc
 
</syntaxhighlight>
 
  
Perl  
+
===Perl===
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
Line 37: Line 43:
  
  
SNMP
+
===SNMP===
  
 +
Sometimes you might encounter some SNMP errors on latest Debian based distributions.
  
Sometimes you might encounter some SNMP errors on latest Debian based distributions.
 
 
In that case you have to install a new package and run it.
 
In that case you have to install a new package and run it.
  
Line 52: Line 58:
  
  
==PHP 5==
+
==PHP 8==
 
+
2021-11: PHP 8 is not included in Ubuntu 20.04 LTS.
Core
 
  
<syntaxhighlight lang="bash">
+
Source article: http://www.daxiongmao.eu/wiki/index.php?title=Apache_2&action=edit
apt-get install libapache2-mod-php5 php5 php5-common
 
</syntaxhighlight>
 
  
Module PHP5
+
===Add PHP 8.0 repository===
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
apt-get install php5-curl php5-dev php5-gd php-pear php5-imagick php5-imap php5-mcrypt
+
apt install software-properties-common
apt-get install php5-memcache php5-mhash php5-mysql php5-snmp php5-xmlrpc php5-xcache php5-curl php5-xsl
+
add-apt-repository ppa:ondrej/php
 +
apt update
 
</syntaxhighlight>
 
</syntaxhighlight>
  
Additional libs
+
===Install core packages===
 
 
<syntaxhighlight lang="bash">
 
apt-get install php5-cli php5-cgi php-pear php-auth php5-mcrypt mcrypt
 
</syntaxhighlight>
 
  
Image Magick
+
To install the latest version of PHP:
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
apt-get install php5-imagick imagemagick
+
# PHP core
 +
apt-get install php
 +
apt-get install php-cli
 +
# Apache2 support
 +
apt install libapache2-mod-php
 
</syntaxhighlight>
 
</syntaxhighlight>
  
  
==Firewall==
+
===Modules PHP===
 
 
You have to open the following ports:
 
* Port 80 = HTTP
 
* Port 443 = HTTPS
 
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
$IPTABLES -A INPUT -p tcp -m state -i eth0 --dport 80 -j ACCEPT
+
apt-get install php-cgi
$IPTABLES -A INPUT -p tcp -m state -i eth0 --dport 443 -j ACCEPT
+
#apt-get install php-opcache
 +
apt-get install php-gd
 +
apt-get install php-bz2
 +
apt-get install php-curl
 +
apt-get install php-xmlrpc
 +
apt-get install php-json
 +
apt-get install php-mysql
 +
apt-get install php-imap
 +
apt-get install php-mbstring
 +
# Performances
 +
apt install php-fpm libapache2-mod-fcgid
 
</syntaxhighlight>
 
</syntaxhighlight>
  
Restart the firewall
+
Enable modules
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
/etc/init.d/firewall restart
+
sudo a2enmod proxy_fcgi setenvif
 +
sudo a2enconf php8.0-fpm
 
</syntaxhighlight>
 
</syntaxhighlight>
  
 
+
===Utility===
 
 
 
 
=PHP 5=
 
 
 
 
 
Edit config file:
 
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
vim /etc/php5/apache2/php.ini
+
apt install php-pear
 
</syntaxhighlight>
 
</syntaxhighlight>
  
Add / uncomment the following lines in Dynamic extensions area (~ line 865)
+
===Configuration===
* extension=mysql.so
 
* extension=gd.so
 
 
 
 
 
!! Note this is NOT required on Ubuntu 14.04 because these modules are enabled by default !!
 
  
 
+
Edit '''PHP config''' file:
 
 
 
 
 
 
=Test your installation=
 
 
 
You can now test your installation by going to 'http://localhost' or 'http://myServer'. You should see the default page.
 
 
 
 
 
 
 
 
 
 
 
 
 
=Apache 2 configuration # Virtual host=
 
 
 
 
 
==Preparation==
 
 
 
Initialize configuration
 
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
cd /etc/apache2/sites-available/
+
vim /etc/php/8.0/cli/php.ini
 
</syntaxhighlight>
 
</syntaxhighlight>
  
Create target directory
+
* Let CGI behaves like before: set <code>cgi.fix_pathinfo=1</code>
 +
* Adjust file upload size <code>upload_max_filesize = 32M</code>
 +
* Adjust post size <code>post_max_size = 32M</code>
 +
* Adjust time zone <code>date.timezone = Europe/Paris</code>
 +
* Save path: <code>session.save_path = "/tmp"</code>
  
<syntaxhighlight lang="bash">
+
===Check PHP version and configuration===
mkdir -p /var/www/myServer
 
</syntaxhighlight>
 
  
Prepare the log files
+
To ensure PHP 8.0 is well-installed just type:
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
mkdir -p /var/log/apache2/myServer
+
php -v
touch /var/log/apache2/myServer/access.log
 
touch /var/log/apache2/myServer/error.log
 
chmod -R 660 /var/log/apache2/myServer/*
 
chown -R www-data:www-data /var/log/apache2/myServer/*
 
 
</syntaxhighlight>
 
</syntaxhighlight>
  
  
==Configuration==
+
===Image Magick===
 
 
Init configuration
 
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
cp /etc/apache2/sites-available/000-default.conf /etc/apache2/sites-available/myServer.conf
+
apt install php-gd php-imagick imagemagick
 
</syntaxhighlight>
 
</syntaxhighlight>
  
 +
===Configuration===
  
'''Edit configuration'''
+
Edit PHP config file:
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
vim /etc/apache2/sites-available/myServer
+
vim /etc/php/8.0/apache2/php.ini
 
</syntaxhighlight>
 
</syntaxhighlight>
  
 
+
Add / uncomment the following lines in Dynamic extensions area
To begin the virtual host, write the following lines:
+
<syntaxhighlight lang="php">
* Adjust the settings to your own configuration
+
// PHP 8  (~ line 904)
 
+
extension=bz2
<syntaxhighlight lang="bash">
+
extension=curl
<VirtualHost 192.168.0.100:80>   → Choose the best options for your needs
+
extension=gd
<VirtualHost *:80>
+
extension=imap
 
+
extension=mysqli
ServerName myServer
 
ServerAlias www.myServer *.myServer
 
ServerAdmin webmaster@domain
 
 
# Logs settings
 
LogLevel Warn
 
CustomLog {APACHE_LOG_DIR}/myServer/access.log combined
 
ErrorLog {APACHE_LOG_DIR}/myServer/error.log
 
 
 
# Root folder properties
 
DocumentRoot /var/www/myServer
 
<Directory />
 
Options FollowSymLinks
 
AllowOverride None
 
</Directory>
 
        <Directory /var/www/myServer />
 
Options Indexes FollowSymLinks MultiViews
 
AllowOverride None
 
Order allow,deny
 
allow from all
 
</Directory>
 
 
 
# Scripts CGI
 
# [ required for PHP 5 ]
 
ScriptAlias /cgi-bin/ /var/www/cgi-bin
 
<Directory "/var/www/cgi-bin">
 
AllowOverride None
 
Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
 
Order allow,deny
 
Allow from all
 
</Directory>
 
 
 
</VirtualHost>
 
 
</syntaxhighlight>
 
</syntaxhighlight>
  
  
'''Activation of a Virtual Host'''
+
!! Note this is NOT required on Ubuntu 20.04 because these modules are enabled by default !!
  
To activate a Virtual Host, just type
+
==Firewall==
  
<syntaxhighlight lang="bash">
+
see [[Firewall INPUT filters#Web server]]
a2ensite  myServer
 
</syntaxhighlight>
 
  
Then, restart your web server
+
Restart the firewall
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
/etc/init.d/apache2 restart
+
/etc/init.d/firewall restart
</syntaxhighlight>
 
 
 
 
 
 
 
 
 
=Apache 2 configuration # SSL Virtual host=
 
 
 
 
 
==Create SSL certificate==
 
 
 
First of all, you need to create a server certificate.
 
Cf. SSL dedicated document → Create a new server certificate
 
 
 
>> see [[SSL server]]
 
 
 
 
 
==Enable SSL module==
 
 
 
Create symlinks for server certificate
 
 
 
<syntaxhighlight lang="bash">
 
ln -s /srv/ssl/certs/myServer.cert.pem /etc/apache2/webServer.pem
 
ln -s /srv/ssl/private/myServer.nopass.key /etc/apache2/webServer.key
 
</syntaxhighlight>
 
 
 
 
 
Activate the SSL module
 
 
 
<syntaxhighlight lang="bash">
 
a2enmod ssl
 
</syntaxhighlight>
 
 
 
 
 
==Prepare virtual host (optional)==
 
 
 
Create virtual host folder
 
 
 
<syntaxhighlight lang="bash">
 
mkdir -p /var/www/myServer-ssl
 
cp /var/www/index.html /var/www/myServer-ssl
 
chown -R www-data:www-data /var/www/myServer-ssl
 
</syntaxhighlight>
 
 
 
 
 
==Prepare the log files (optional)==
 
 
 
<syntaxhighlight lang="bash">
 
mkdir -p /var/log/apache2/myServer-ssl
 
touch /var/log/apache2/myServer-ssl/error.log
 
touch /var/log/apache2/myServer-ssl/access.log
 
chmod 660 /var/log/apache2/*
 
chown root:www-data /var/log/apache2/*
 
</syntaxhighlight>
 
 
 
 
 
==Virtual host declaration==
 
 
 
You have 2 possibilities:
 
* Update your current virtual host
 
* Create a new one, only for the SSL virtual host
 
 
 
 
 
'''New virtual host: Init configuration'''
 
 
 
<syntaxhighlight lang="bash">
 
cp /etc/apache2/sites-available/default-ssl /etc/apache2/sites-available/myServer-ssl
 
</syntaxhighlight>
 
 
 
 
 
'''Edit V.Host configuration'''
 
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/sites-available/myServer-ssl
 
</syntaxhighlight>
 
 
 
 
 
Then, you will need to edit the Virtual Host configuration file:
 
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/sites-availables/virtualHostName
 
</syntaxhighlight>
 
 
 
!! Adjust the settings to your own configuration
 
 
 
<syntaxhighlight lang="bash">
 
# Secure web server
 
<VirtualHost _default_:443>
 
<VirtualHost 192.168.0.100:443>   → Choose the best options for your needs
 
<VirtualHost *:443>
 
 
 
ServerName myServer
 
ServerAlias www.myServer *.myServer
 
ServerAdmin webmaster@domain
 
 
# Logs settings
 
LogLevel Warn
 
CustomLog {APACHE_LOG_DIR}/myServer-ssl/access.log combined
 
ErrorLog {APACHE_LOG_DIR}/myServer-ssl/error.log
 
 
 
# Root folder properties
 
DocumentRoot /var/www/myServer-ssl
 
 
 
        # Enable SSL
 
        SSLEngine              On
 
        SSLCertificateFile      /etc/apache2/webServer.pem
 
        SSLCertificateKeyFile  /etc/apache2/webServer.key
 
 
 
        # Root directory properties
 
        <Directory /var/www/ssl />
 
            Options Indexes FollowSymLinks MultiViews
 
            AllowOverride None
 
            Order allow,deny
 
            allow from all
 
        </Directory>
 
 
 
        ##########################
 
        # ALIAS AND REDIRECTIONS #
 
        ##########################
 
 
 
</VirtualHost>
 
</syntaxhighlight>
 
 
 
Enable site
 
 
 
<syntaxhighlight lang="bash">
 
a2ensite myServer-ssl
 
</syntaxhighlight>
 
 
 
Restart the web server
 
 
 
<syntaxhighlight lang="bash">
 
/etc/init.d/apache2 restart
 
</syntaxhighlight>
 
 
 
 
 
==Accept auto-signed certificate==
 
 
 
Go to https://myServer/certs/
 
Cf SSL document to get installation details
 
 
 
 
 
 
 
 
 
=Apache 2 configuration # Redirections=
 
 
 
 
 
==Enable redirections==
 
 
 
Module "rewrite" allows you to redirect source URL to another one.
 
 
 
<syntaxhighlight lang="bash">
 
a2enmod rewrite
 
</syntaxhighlight>
 
 
 
 
 
==Alias redirection==
 
 
 
Edit configuration
 
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/sites-available/myServer
 
</syntaxhighlight>
 
 
 
 
 
 
 
The following example will redirect a /myAlias from HTTP to HTTPS.
 
 
 
You can adjust that example to redirect to another server too by adjusting the rewrite rule.
 
 
 
<syntaxhighlight lang="bash">
 
<VirtualHost *:80>
 
...
 
RewriteRule ^/myAlias(/.*|$)    https://%{HTTP_HOST}/myAlias$1 [L,R]
 
<Location /myAlias >
 
order deny,allow
 
deny from all
 
                # Only allow specific IP@
 
                # allow from 127.0.0.1 192.168.1.0/24
 
                allow from all
 
</Location>
 
...
 
</VirtualHost>
 
<VirtualHost *:443>
 
...
 
# PHPSecInfo
 
Alias /myAlias  /var/www/myAlias
 
<Location /myAlias >
 
order deny,allow
 
deny from all
 
                # Only allow specific IP@
 
                # allow from 127.0.0.1 192.168.0.0/255.255.255.0
 
                allow from all
 
        </Location>
 
...
 
</VirtualHost>
 
 
</syntaxhighlight>
 
</syntaxhighlight>
  
  
Reload your configuration
 
 
<syntaxhighlight lang="bash">
 
/etc/init.d/apache2 reload
 
</syntaxhighlight>
 
  
 +
==Test your installation==
  
==Module configuration==
 
  
Create the module configuration file
+
Restart the Apache2 server
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/conf.d/rewrite.conf
 
</syntaxhighlight>
 
 
 
Copy / paste this configuration (adjust to your own settings!)
 
 
 
<syntaxhighlight lang="bash">
 
  RewriteEngine On
 
  # --------------------- SECURITY RULES (JOOMLA) ------------------------ #
 
  ## End of deny access to extension xml files
 
  RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]
 
  # Block out any script trying to base64_encode crap to send via URL
 
  RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [OR]
 
  # Block out any script that includes a <script> tag in URL
 
  RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR]
 
  # Block out any script trying to set a PHP GLOBALS variable via URL
 
  RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
 
  # Block out any script trying to modify a _REQUEST variable via URL
 
  RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2})
 
  # Send all blocked request to homepage with 403 Forbidden error!
 
  RewriteRule ^(.*)$ index.php [F,L]
 
  # --------------------- SECURITY RULES (PERSONAL) ------------------------ #
 
  ## DENY REQUEST BASED ON REQUEST METHOD ###
 
  RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK|OPTIONS|HEAD)$ [NC]
 
  RewriteCond %{REQUEST_METHOD} (GET|POST) [NC]
 
  RewriteRule ^.*$ - [F]
 
  # Eviter les failles de securite
 
  RewriteCond %{QUERY_STRING} ^(.*)http(\:|\%3A)(.*)$
 
  RewriteCond %{QUERY_STRING} mosConfig_ [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^(.*)(%3C|<)/?script(.*)$ [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^(.*)(%3D|=)?javascript(%3A|:)(.*)$ [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^(.*)document\.location\.href(.*)$ [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^(.*)base64_encode(.*)$ [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^(.*)GLOBALS(=|[|%[0-9A-Z]{0,2})(.*)$ [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^(.*)_REQUEST(=|[|%[0-9A-Z]{0,2})(.*)$ [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^(.*)(SELECT|INSERT|DELETE|CHAR\(|UPDATE|REPLACE|LIMIT)(.*)$
 
  # Eviter les erreurs basiques
 
  RewriteCond %{QUERY_STRING} \.\.\/    [NC,OR]
 
  RewriteCond %{QUERY_STRING} boot\.ini [NC,OR]
 
  RewriteCond %{QUERY_STRING} tag\=    [NC,OR]
 
  RewriteCond %{QUERY_STRING} ftp\:    [NC,OR]
 
  RewriteCond %{QUERY_STRING} http\:    [NC,OR]
 
  RewriteCond %{QUERY_STRING} https\:  [NC,OR]
 
  RewriteCond %{QUERY_STRING} mosConfig [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|'|"|\?|\*).* [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^.*(%22|%27|%3C|%3D|%3E|%7B|%7C).* [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^.*(%0|%A|%B|%C|%D|%F|127\.0).* [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^.*(globals|encode|localhost|loopback).* [NC,OR]
 
  RewriteCond %{QUERY_STRING} ^.*(select|insert|union|declare|drop).* [NC]
 
  RewriteRule ^(.*)$ - [F,L]
 
 
 
  # Ban Typical Vulnerability Scanners and others
 
  # Kick out Script Kiddies
 
  RewriteCond %{HTTP_USER_AGENT} ^(java|curl|wget).* [NC,OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^.*(libwww-perl|curl|wget|python|nikto|wkito|pikto|scan|acunetix).* [NC,OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^.*(winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner).* [NC,OR]
 
  # Eviter les programmes de Zombies
 
  RewriteCond %{HTTP_USER_AGENT} ^Anarchie [OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^ASPSeek [OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^attach [OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^autoemailspider [OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^Xaldon\ WebSpider [OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^Xenu [OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^Zeus.*Webster [OR]
 
  RewriteCond %{HTTP_USER_AGENT} ^Zeus
 
  RewriteRule ^.* - [F,L]
 
 
 
  # Allow the robots to reference our website
 
  RewriteCond %{HTTP_USER_AGENT} !^Googlebot [NC]
 
  RewriteCond %{HTTP_USER_AGENT} !^Googlebot-Image [NC]
 
  RewriteCond %{HTTP_USER_AGENT} !^Googlebot-Mobile [NC]
 
  RewriteCond %{HTTP_USER_AGENT} !^Msnbot [NC]
 
  RewriteCond %{HTTP_USER_AGENT} !^Mediapartners-Google [NC]
 
 
 
  # Keep request without referer
 
  RewriteCond %{HTTP_REFERER} !^$
 
 
 
  # To allow your pictures to be displayed on Google
 
  RewriteCond %{HTTP_REFERER} !^http://.*google\.(comŠ(co\.)?[a-z]{2})/
 
  # To forbid the copy of your pictures to anyone else : display an other image !
 
  RewriteRule .*\.(jpe?g|gif|bmp|png)$ /images/hotlinkis.jpg [L]
 
</syntaxhighlight>
 
 
 
 
 
==Redirect HTTP to HTTPS==
 
 
 
The safer way to redirect HTTP to HTTPS is use to adjust the virtual host configuration.
 
 
 
<syntaxhighlight lang="bash">
 
<VirtualHost *:80>
 
ServerAdmin guillaume@qin-diaz.com
 
ServerName dev.daxiongmao.eu
 
ServerAlias *.dev.daxiongmao.eu
 
 
 
### LOG ###
 
ErrorLog ${APACHE_LOG_DIR}/daxiongmao/error.log
 
LogLevel warn
 
CustomLog ${APACHE_LOG_DIR}/daxiongmao/access.log combined
 
 
 
 
############################################
 
## Redirect all traffic to HTTPS website
 
        ############################################
 
        RewriteEngine On
 
        # This checks to make sure the connection is not already HTTPS
 
        RewriteCond %{HTTPS} off       
 
        # This rule will redirect users from their original location, to the same location but using HTTPS.
 
        RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI}
 
# Alternate (fail-over) solution
 
redirect permanent / https://myServer/
 
 
 
 
 
## No need of a document root anymore as everything is redirect
 
 
</VirtualHost>
 
</syntaxhighlight>
 
 
 
==Take changes into account==
 
 
 
You have to restart the server to use this settings
 
  
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
Line 563: Line 186:
  
  
 
+
Create a simple PHP script
 
 
 
 
=Apache 2 # redirections using mod_proxy=
 
 
 
 
 
Thanks to Julien Rialland for his insight regarding this part!
 
 
 
 
 
==Principle==
 
 
 
The proxy module allow you to redirect remote user to a specific server that can be host on a different machine or port through a clear URL.
 
 
 
 
 
===Current limits===
 
 
 
Some application are not available from outside…
 
 
 
* For security reasons [default URL is not allowed]
 
 
 
[[File:Apache2 proxy security limit.png|none|Proxy for security]]
 
 
 
 
 
* Due to network issues
 
 
 
[[File:Apache2 proxy network issues.png|none|Proxy to improve network]]
 
 
 
 
 
===Proxy module role===
 
 
 
The proxy module allow you to provide access through transparent redirection.
 
 
 
It relies on:
 
* Already open port (80 or 443)
 
* Redirection rule
 
* Each service URL must be unique
 
* The target service must be reachable by the web server
 
 
 
[[File:Apache2 proxy role.png|none|Proxy role]]
 
 
 
 
 
As you can see on the following example, the previous services will be accessible using some dedicated URL.
 
Remote “http://myServer/myService” will redirect to “http://localhost:8081”
 
 
 
→ The ''mod_proxy'' is none intrusive.
 
You don’t have to change anything is the orginal service configuration. Apache2 will handle all the transformations.
 
 
 
 
 
==Proxy / redirect / rewrite==
 
 
 
When Apache2 receive a request it will be process in the following order:
 
 
 
[[File:Apache2 proxy rewrite.png|none|Proxy rewrite]]
 
 
 
 
 
So, even if you enable a full redirection to HTTPS you can still use some HTTP service through mod_proxy.
 
 
 
 
 
==Enable proxy module==
 
 
 
<syntaxhighlight lang="bash">
 
a2enmod proxy proxy_http proxy_ajp
 
</syntaxhighlight>
 
 
 
 
 
==Configure proxy redirections==
 
 
 
You can configure the redirections in 2 ways:
 
* Through your virtual host configuration
 
* Through the module configuration file
 
 
 
 
 
===Module configuration file===
 
 
 
You have to edit / create the configuration file.
 
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/mods-enabled/proxy.conf
 
</syntaxhighlight>
 
 
 
 
 
===Virtual host===
 
 
 
Just edit again your previous V.Host:
 
 
 
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
vim /etc/apache2/sites-available/myServer.conf
+
vim /var/www/html/phpinfo.php
 
</syntaxhighlight>
 
</syntaxhighlight>
 
 
===Proxy declaration===
 
 
Adjust the file to:
 
 
<syntaxhighlight lang="bash">
 
<VirtualHost *:80>
 
...
 
## Proxy
 
ProxyVia On
 
        ProxyPreserveHost On
 
        <Proxy *>
 
            AddDefaultCharset off
 
            Order deny,allow
 
            Allow from all
 
</Proxy>
 
 
        #### To allow some URLs to go through without being proxy ####
 
# Active MQ REST web-service, required for hawt.io management
 
ProxyPass /activemq-api http://localhost:8161/activemq-api
 
ProxyPassReverse /activemq-api http://localhost:8161/activemq-api
 
</VirtualHost>
 
 
<VirtualHost *:443>
 
...
 
## Proxy
 
ProxyVia On
 
        ProxyPreserveHost On
 
        <Proxy *>
 
            AddDefaultCharset off
 
            Order deny,allow
 
            Allow from all
 
            Satisfy Any
 
        </Proxy>
 
 
RewriteEngine On
 
 
########################
 
# Allow some URLs to go through without being proxy
 
########################
 
        # URL to discard => Classic HTTP services
 
ProxyPass /menu !
 
ProxyPass /maintenance !
 
 
# PhpMyAdmin
 
<Location /phpmyadmin>
 
Order allow,deny
 
Allow from 127.0.0.1 192.168.1.0/24
 
Require all granted
 
ProxyPass !
 
</Location>
 
 
########################
 
# Proxy redirections
 
########################
 
 
# Proxy to a Java application running over Tomcat
 
ProxyPass /webdav/ ajp://localhost:8009/webdav/
 
ProxyPassReverse /webdav/ ajp://localhost:8009/webdav
 
 
# Proxy to a Java application running over Tomcat, with IP filter
 
<Location /manager>
 
Order allow,deny
 
Allow from 127.0.0.1 192.168.1.0/24 193.12.118.196
 
ProxyPass ajp://localhost:8009/manager/
 
ProxyPassReverse ajp://localhost:8009/manager/
 
</Location>
 
 
        # Proxy to another server
 
        ProxyPass /jira http://192.168.1.12:8080/jira
 
        ProxyPassReverse /jira http://192.168.1.12:8080/jira
 
</VirtualHost>
 
 
 
#
 
# Instead of "VirtualHost" you can use "IfModule" if you're editing the "proxy.conf" file
 
#
 
<IfModule mod_proxy.c>
 
 
</IfModule>
 
</syntaxhighlight>
 
 
Some notes:
 
* Do NOT put a / after the target URL
 
* Do NOT use / as ProxyPass source, use the previous redirect permanent instead
 
 
 
Apply changes and test result
 
 
<syntaxhighlight lang="bash">
 
service apache2 restart
 
</syntaxhighlight>
 
 
 
For example, Navigate to http://myServer/jira
 
 
 
 
 
=Apache 2 configuration # LDAP authentication=
 
 
 
==Modules and options lips==
 
 
List of apache 2.2.x modules with roles and recommended values:
 
 
 
* AuthType
 
 
{| class="wikitable"
 
|-
 
| Role || This tells Apache which authentication module you want to use
 
|-
 
| Value || '''basic'''
 
|-
 
| Mandatory || Yes
 
|}
 
 
 
* AuthName
 
 
{| class="wikitable"
 
|-
 
| Role || Authentication window name
 
|-
 
| Value || “Authentication to my service”
 
|-
 
| Mandatory || Yes
 
|}
 
 
 
* AuthBasicProvider
 
 
{| class="wikitable"
 
|-
 
| Role || This tells Apache which authentication module you want to use
 
|-
 
| Value || '''ldaps'''
 
|-
 
| Mandatory || Yes
 
|}
 
 
 
* AuthzLDAPAuthoritative
 
 
{| class="wikitable"
 
|-
 
| Role || Tells Apache whether or not a failed authentication request can be passed to other Apache modules
 
|-
 
| Value || '''off'''
 
|-
 
| Mandatory || Yes
 
|}
 
 
 
* AuthLDAPBindDN
 
 
{| class="wikitable"
 
|-
 
| Role || The distinguished name (DN) of service account.
 
 
This user will be used to scan the LDAP and perform real user authentication
 
|-
 
| Value || '''UID=myUser,OU=myGroup,DC=myServer'''
 
 
uid=svn,ou=applications,dc=dev,dc=daxiongmao,dc=eu
 
|-
 
| Mandatory || No
 
|}
 
 
 
* AuthLDAPBindPassword
 
 
{| class="wikitable"
 
|-
 
| Role || The password for the user account configured via the AuthLDAPBindDN directive
 
|-
 
| Value ||
 
|-
 
| Mandatory || No
 
|}
 
 
 
* AuthLDAPURL
 
 
{| class="wikitable"
 
|-
 
| Role || URL that tells:
 
* Where the directory server is,
 
* Where to look for users at,
 
* What user attribute is used to identify a user
 
|-
 
| Value || '''ldaps://myServer:636/OU=group&,OU=group2,DC=myServer?attribute'''
 
 
ldap://myServer:389/OU=group&,OU=group2,DC=myServer?attribute
 
 
ldap://192.168.1.2:389/cn=users,dc=server2,dc=intranet,dc=myCompany,dc=com
 
 
ldap://localhost:389/ou=people,dc=vehco,dc=com?uid
 
 
|-
 
| Mandatory || Yes
 
|}
 
 
 
 
==Modules==
 
 
Installation:
 
 
<syntaxhighlight lang="bash">
 
apt-get install libapache2-mod-ldap-userdir
 
apt-get install libapache2-mod-vhost-ldap libapache2-mod-webauthldap
 
</syntaxhighlight>
 
 
 
You have to enable to the following modules:
 
 
<syntaxhighlight lang="bash">
 
a2enmod ldap authnz_ldap
 
</syntaxhighlight>
 
 
 
Restart server to apply changes:
 
 
<syntaxhighlight lang="bash">
 
service apache2 restart
 
</syntaxhighlight>
 
 
 
==Configuration==
 
 
You can use the following settings inside a “.htaccess” or “VirtualHost” configuration:
 
 
Edit configuration
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/sites-available/myServer
 
</syntaxhighlight>
 
 
 
Adjust your virtual-host like that:
 
 
<syntaxhighlight lang="bash">
 
# LDAP protected directory
 
<Directory /var/www/ssl/secure>
 
  Options Indexes FollowSymLinks MultiViews
 
  AllowOverride None
 
  Order allow,deny
 
  allow from all
 
 
  AuthType basic
 
  AuthName "Secure area"
 
  ###########################
 
  # Choose a LDAP provider
 
  ###########################
 
  # If "localhost" then use LDAP.
 
  AuthBasicProvider ldap
 
  AuthLDAPUrl "ldap://localhost:389/{LDAP ou=,dc=}?uid"
 
  # If remote URL then use LDAP over SSL
 
  #AuthBasicProvider ldaps
 
  #AuthLDAPUrl "ldaps://myServer:636/{LDAP ou=,dc=}?uid"
 
 
 
  Require valid-user
 
 
  # example
 
  # AuthLDAPBindDN "cn=admin,dc=dev,dc=daxiongmao,dc=eu"
 
  # AuthLDAPUrl "ldap://localhost:389/ou=people,dc=dev,dc=daxiongmao,dc=eu?uid"
 
  # AuthLDAPUrl "ldaps://myServer:636/ou=people,dc=dev,dc=daxiongmao,dc=eu?uid"
 
 
</Directory>
 
</syntaxhighlight>
 
 
 
==Secure all the website==
 
 
You have to adjust you document root like that:
 
 
<syntaxhighlight lang="bash">
 
<VirtualHost _default_:443>
 
 
# Restrict access to document root
 
DocumentRoot /var/www/daxiongmao-ssl
 
<Directory />
 
Options FollowSymLinks
 
AllowOverride None
 
Order allow,deny
 
deny from all
 
</Directory>
 
<Directory /var/www/daxiongmao-ssl>
 
Options Indexes FollowSymLinks MultiViews
 
AllowOverride None
 
Order allow,deny
 
allow from all
 
 
AuthType basic
 
AuthName "Secure area"
 
AuthBasicProvider ldap
 
AuthLDAPUrl "ldap://localhost:389/ou=people,dc=dev,dc=daxiongmao,dc=eu?uid"
 
Require valid-user
 
</Directory>
 
[…]
 
</syntaxhighlight>
 
 
 
 
 
=Advanced configuration=
 
 
 
==Ports number==
 
 
You can change the Apache2 server ports
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/ports.conf
 
</syntaxhighlight>
 
 
 
Edit
 
 
<syntaxhighlight lang="bash">
 
# HTTP
 
Listen 80
 
# HTTPS
 
Listen 443
 
</syntaxhighlight>
 
 
 
==Restricted access==
 
 
Edit configuration
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/sites-available/myServer
 
</syntaxhighlight>
 
 
If your server is directly accessible on Internet: you should protect it!
 
 
<syntaxhighlight lang="bash">
 
# Disable access to the entire file system except for the directories that
 
# are explicitly allowed later.
 
#
 
<Directory />
 
        AllowOverride None
 
        Order Deny,Allow
 
        Deny from all
 
</Directory>
 
 
# Protect .htacess files
 
<Files ~ "^\.ht">
 
    Order allow,deny
 
    Deny from all
 
</Files>
 
</syntaxhighlight>
 
 
 
==Be discreet!==
 
 
 
===PHP info===
 
 
Check the current server status using a simple PHP info file.
 
 
<syntaxhighlight lang="bash">
 
vim /var/www/myServer/phpinfo.php
 
</syntaxhighlight>
 
 
  
 
Put the following:
 
Put the following:
 
 
<syntaxhighlight lang="php">
 
<syntaxhighlight lang="php">
 
<?php
 
<?php
// Show all information, defaults to INFO_ALL
 
 
phpinfo();
 
phpinfo();
 
?>
 
?>
 
</syntaxhighlight>
 
</syntaxhighlight>
  
 
+
Adjust rights
Adjust rights and ownership:
 
 
 
 
<syntaxhighlight lang="bash">
 
<syntaxhighlight lang="bash">
chown -R www-data:www-data /var/www/myServer
+
chown www-data:www-data /var/www/html/phpinfo.php
chmod -R 755 /var/www/myServer
+
chmod 755 /var/www/html/phpinfo.php
 
</syntaxhighlight>
 
</syntaxhighlight>
  
  
 
+
You can now test your installation by going to 'http://localhost/phpinfo.php' or 'http://myServer/phpinfo.php'. You should see the default page.
===Adjust verbose level===
 
 
 
Do not gives details about your configuration to outsiders.
 
 
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/conf.d/security
 
</syntaxhighlight>
 
 
 
Set the following settings
 
 
 
<syntaxhighlight lang="bash">
 
#### Ask your server to be more discret!
 
# ServerTokens
 
# Set to one of:  Full | OS | Minimal | Minor | Major | Prod
 
ServerTokens Prod
 
 
 
ServerSignature Off
 
TraceEnable Off
 
</syntaxhighlight>
 
 
 
Restart Apache2
 
<syntaxhighlight lang="bash">
 
service apache2 restart
 
</syntaxhighlight>
 
 
 
Re-run PHP info, you should have less information.
 
 
 
 
 
 
 
=Apache 2 and PHP5: Secure your installation!=
 
 
 
 
 
==PHP Security Info==
 
If you want to test your PHP security, you can use the PHPSecInfo tool, available at: http://phpsec.org/projects/phpsecinfo/index.html
 
 
 
 
 
===Installation===
 
<syntaxhighlight lang="bash">
 
cd /tmp
 
wget http://phpsec.org/projects/phpsecinfo/phpsecinfo.zip
 
unzip phpsecinfo.zip
 
mv phpsecinfo-Version phpsecinfo
 
mv phpsecinfo/ /var/www
 
cd /var/www
 
chown -R www-data:www-data phpsecinfo
 
</syntaxhighlight>
 
 
 
 
 
===Virtual host configuration===
 
Edit configuration
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/sites-available/myServer
 
</syntaxhighlight>
 
 
 
!! For security reason: DO NOT use 'phpsecinfo' as alias. It's too easy to guess.
 
<syntaxhighlight lang="bash">
 
<VirtualHost *:80>
 
# Advanced redirection – Only allow specific IP @
 
RewriteRule ^/phpsec(/.*|$)    https://%{HTTP_HOST}/phpsec$1 [L,R]
 
<Location /phpsec >
 
order deny,allow
 
deny from all
 
                # Only allow specific IP@
 
                # allow from 127.0.0.1 192.168.0.0/255.255.255.0
 
                allow from all
 
</Location>
 
</VirtualHost>
 
 
 
<VirtualHost _default_:443>
 
# PHPSecInfo
 
Alias /phpsec  /var/www/phpsecinfo
 
<Location /phpsec >
 
order deny,allow
 
deny from all
 
                # Only allow specific IP@
 
                # allow from 127.0.0.1 192.168.0.0/255.255.255.0
 
              allow from all
 
        </Location>
 
</VirtualHost>
 
</syntaxhighlight>
 
 
 
Reload your configuration
 
<syntaxhighlight lang="bash">
 
/etc/init.d/apache2 reload
 
</syntaxhighlight>
 
 
 
 
 
===Run the test===
 
To asset your current installation you can run the test: https:// myServer/phpsec
 
 
 
 
 
==Improve security==
 
 
 
===PHP5 sessions and temp files===
 
Create specific directory to store the sessions and temp files:
 
<syntaxhighlight lang="bash">
 
mkdir -p /etc/php5/temp
 
mkdir -p /etc/php5/session
 
chown -R www-data:root /etc/php5/temp
 
chown -R www-data:root /etc/php5/session
 
chmod -R 770 /etc/php5/session
 
chmod -R 770 /etc/php5/temp
 
</syntaxhighlight>
 
 
 
Edit the configuration file
 
<syntaxhighlight lang="bash">
 
vim /etc/php5/apache2/php.ini
 
</syntaxhighlight>
 
 
 
line 798 → upload_tmp_dir = /etc/php5/temp
 
line 1409 → session.save_path = "/etc/php5/session"
 
 
 
===PHP5 tweak===
 
<syntaxhighlight lang="bash">
 
vim /etc/php5/apache2/php.ini
 
</syntaxhighlight>
 
 
 
line 261 → expose_php = Off
 
line 480 → display_errors=Off
 
line 675 → post_max_size=256K
 
line 814 → allow_url_fopen=Off
 
 
 
DO NOT enable the open_basedir (even if the test say so! It’s a troublesome setting)
 
 
 
Restart your server to load the changes:
 
<syntaxhighlight lang="bash">
 
service apache2 restart
 
</syntaxhighlight>
 
 
 
Re-run the test. Then:
 
* Ignore the open_basedir and upload_tmp_dir alerts, if any.
 
* You can enable some specific options with a .htaccess file
 
 
 
 
 
===Change Apache 2 UID===
 
Do not change the UID if you already have install web programs such as phpldapadmin or phpmyadmin, cacti, ...
 
 
 
====Change the Apache UID====
 
<syntaxhighlight lang="bash">
 
vim /etc/group
 
</syntaxhighlight>
 
 
 
Change www-data UID
 
<syntaxhighlight lang="bash">
 
    www-data:x:10033:
 
</syntaxhighlight>
 
 
 
====Change the Apache GID====
 
<syntaxhighlight lang="bash">
 
vim /etc/passwd
 
</syntaxhighlight>
 
 
 
Change the group settings
 
<syntaxhighlight lang="bash">
 
www-data:x:10033:10033:www-data:/var/www:/bin/false
 
</syntaxhighlight>
 
 
 
Apply modifications
 
<syntaxhighlight lang="bash">
 
chown -R www-data:www-data /var/www/*
 
chown -R www-data:root /etc/php5/*
 
</syntaxhighlight>
 
 
 
To take on the modifications you have to reboot your server.
 
 
 
 
 
===Avoid DOS attacks===
 
Source: Linux mag’ – Hors serie Apache2
 
 
 
You can protect your server from Denial Of Service (DOS) attacks through mod_evasive
 
<syntaxhighlight lang="bash">
 
apt-get install libapache2-mod-evasive
 
</syntaxhighlight>
 
 
 
Prepare log directory
 
<syntaxhighlight lang="bash">
 
mkdir /var/log/apache2/mod_evasive
 
chown -R www-data:www-data  /var/log/apache2/mod_evasive
 
</syntaxhighlight>
 
 
 
Enable module
 
<syntaxhighlight lang="bash">
 
a2enmod mod-evasive
 
</syntaxhighlight>
 
 
 
 
 
===Configuration===
 
Create the configuration file
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/conf.d/mod_evasive.conf
 
</syntaxhighlight>
 
 
 
Put:
 
<syntaxhighlight lang="bash">
 
# Mod evasive configuration
 
# Based upon Linux Mag
 
<IfModule mod_evasive20.c>
 
DOSHashTableSize 3097
 
 
 
# Limit user to 5 pages per 2 seconds
 
DOSPageCount 5
 
DOSPageInterval 2
 
 
 
# No more than 100 HTTP request per second (HTML, CSS, images, …)
 
DOSSiteCount 100
 
DOSSiteInterval 1
 
 
 
# Block client for 300 seconds
 
DOSBlockingPeriod 300
 
# Send alert email
 
#DOSEmailNotify "admin@myDomain"
 
 
 
# Log directory
 
DOSLogDir "/var/log/apache2/mod_evasive"
 
 
 
# Command to execute on ban
 
#DOSSystemCommand "/sbin/iptables -I INPUT -s %s -j DROP"
 
 
 
# Ignore following IP and networks
 
DOSWhiteList 127.0.0.1
 
#DOSWhitelist 66.249.65.*
 
<IfModule mod_evasive20.c>
 
</syntaxhighlight>
 
 
 
DosHashTableSize = Size of the hash table.
 
* The greater, the more memory is required but the faster it is! The value must be a prime number
 
 
 
 
 
Apply changes
 
<syntaxhighlight lang="bash">
 
service apache2 restart
 
</syntaxhighlight>
 
 
 
 
 
 
 
=Apache2 configuration # Improve server performances=
 
 
 
==Mod deflate: improved the bandwidth==
 
 
 
To improve the bandwidth, you can compress pages and type of content.
 
 
 
=> You can improved your bandwidth from 20 to 30%.
 
 
 
 
 
To do so, you need a specific module for Apache: mod_deflate
 
<syntaxhighlight lang="bash">
 
a2enmod deflate
 
touch /var/log/apache2/deflate.log
 
chown www-data:www-data /var/log/apache2/deflate.log
 
chmod 740 /var/log/apache2/deflate.log
 
</syntaxhighlight>
 
 
 
Edit your web server configuration file:
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/conf.d/deflate.conf
 
</syntaxhighlight>
 
 
 
Add the following lines:
 
<syntaxhighlight lang="bash">
 
### Bandwidth optimization
 
<IfModule mod_deflate.c>
 
AddOutputFilterByType DEFLATE text/html text/plain text/xml text/javascript text/css application/x-javascript
 
DeflateFilterNote deflate_ratio
 
LogFormat "%v %h %l %u %t \"%r\" %>s %b"
 
CustomLog /var/log/apache2/deflate.log vhost_with_deflate_info
 
</IfModule>
 
</syntaxhighlight>
 
 
 
Restart your web server:
 
<syntaxhighlight lang="bash">
 
/etc/init.d/apache2 restart
 
</syntaxhighlight>
 
 
 
 
 
==Mod expires: use the cache of your clients==
 
Another way to improve performances and bandwidth: use the client's cache.
 
 
 
To do so, you need a specific module for Apache: mod_expires
 
<syntaxhighlight lang="bash">
 
a2enmod expires
 
</syntaxhighlight>
 
 
 
Edit your web server configuration file:
 
<syntaxhighlight lang="bash">
 
vim /etc/apache2/expires.conf
 
</syntaxhighlight>
 
 
 
Add the following lines
 
<syntaxhighlight lang="bash">
 
#### Client's cache settings
 
<IfModule mod_expires.c>
 
ExpiresActive on
 
# set the default to 24 hours
 
ExpiresDefault "access plus 24 hours"
 
# cache shockwave-flash for 2 weeks (days | weeks | mounths | years)
 
ExpiresByType application/x-shockwave-flash "access plus 2 weeks"
 
ExpiresByType flv-application/octet-stream "access plus 3 days"
 
# cache common graphics for 3 days
 
ExpiresByType image/jpg "access plus 2 weeks"
 
ExpiresByType image/gif "access plus 2 weeks"
 
ExpiresByType image/jpeg "access plus 2 weeks"
 
ExpiresByType image/png "access plus 2 weeks"
 
# cache CSS for 24 hours
 
ExpiresByType text/css "access plus 24 hours"
 
</IfModule>
 
</syntaxhighlight>
 
 
 
Restart your web server:
 
<syntaxhighlight lang="bash">
 
/etc/init.d/apache2 restart
 
</syntaxhighlight>
 

Latest revision as of 17:38, 3 November 2021



Requirements

Before going through this tutorial, I recommend you to setup:



Installation

Apache 2

This will install web server + PHP + Perl + all required libraries.

Apache2 core

apt install apache2 apache2-utils 
apt install ssl-cert

Since Ubuntu 16.04 apache2-mpm-prefork is not required

Doc

apt install apache2-doc


Perl

apt-get install libapache2-mod-perl2 libapache2-mod-perl2-doc


SNMP

Sometimes you might encounter some SNMP errors on latest Debian based distributions.

In that case you have to install a new package and run it.

apt-get install snmp-mibs-downloader
download-mibs


source: http://www.podciborski.co.uk/miscellaneous/snmp-cannot-find-module/


PHP 8

2021-11: PHP 8 is not included in Ubuntu 20.04 LTS.

Source article: http://www.daxiongmao.eu/wiki/index.php?title=Apache_2&action=edit

Add PHP 8.0 repository

apt install software-properties-common
add-apt-repository ppa:ondrej/php
apt update

Install core packages

To install the latest version of PHP:

# PHP core
apt-get install php
apt-get install php-cli
# Apache2 support
apt install libapache2-mod-php


Modules PHP

apt-get install php-cgi 
#apt-get install php-opcache
apt-get install php-gd 
apt-get install php-bz2 
apt-get install php-curl 
apt-get install php-xmlrpc
apt-get install php-json 
apt-get install php-mysql 
apt-get install php-imap 
apt-get install php-mbstring
# Performances
apt install php-fpm libapache2-mod-fcgid

Enable modules

sudo a2enmod proxy_fcgi setenvif
sudo a2enconf php8.0-fpm

Utility

apt install php-pear

Configuration

Edit PHP config file:

vim /etc/php/8.0/cli/php.ini
  • Let CGI behaves like before: set cgi.fix_pathinfo=1
  • Adjust file upload size upload_max_filesize = 32M
  • Adjust post size post_max_size = 32M
  • Adjust time zone date.timezone = Europe/Paris
  • Save path: session.save_path = "/tmp"

Check PHP version and configuration

To ensure PHP 8.0 is well-installed just type:

php -v


Image Magick

apt install php-gd php-imagick imagemagick

Configuration

Edit PHP config file:

vim /etc/php/8.0/apache2/php.ini

Add / uncomment the following lines in Dynamic extensions area

// PHP 8  (~ line 904)
extension=bz2
extension=curl
extension=gd
extension=imap
extension=mysqli


!! Note this is NOT required on Ubuntu 20.04 because these modules are enabled by default !!

Firewall

see Firewall INPUT filters#Web server

Restart the firewall

/etc/init.d/firewall restart


Test your installation

Restart the Apache2 server

service apache2 restart


Create a simple PHP script

vim /var/www/html/phpinfo.php

Put the following:

<?php
phpinfo();
?>

Adjust rights

chown www-data:www-data /var/www/html/phpinfo.php
chmod 755 /var/www/html/phpinfo.php


You can now test your installation by going to 'http://localhost/phpinfo.php' or 'http://myServer/phpinfo.php'. You should see the default page.