Nicolas Bérard Nault writes:
 > If a programmer is not capable of controlling an user input,

You are making a mistake here.  You are assuming that the user
realized that 'include' is really 'includeremotesecurityhole'.
Consider the security implications of a user 'include'ing a file that
doesn't exist (because the attacker used a different filename).
Pretty small.  They would be akin to what happens when you specify an
.html file that doesn't exist.  Generates an error; no big deal.

Do you see?  Your assumption proves my point: that the naive user
doesn't see any sharp edges on 'include' and doesn't worry about it.

 > I think if a programmer can't read a manual page about a so common
 > function, he deserves what he has.

If 'strchr' caused your CPU's fan to stop turning, should 1) a
work-around be documented, or 2) the code fixed?  If a bug in libjpeg
allows a url_fopened image to contain invalid data that elevates
privilege, should that be 1) a work-around be documented, or 2) the
code fixed?  If the design of 'include' allows remote users to execute
hostile code, should that be 1) a work-around be documented, or 2) the
code fixed?

 > Are you suggesting that virtually _any_ function should be
 > protected against stupidity ?

If people do stupid things with a computer, is it their fault or the
computer's fault?  Personally, I always think it's the computer's
fault.  So, yes, if people end up doing stupid things, it is because
the computer is wrong.

-- 
--My blog is at     blog.russnelson.com         | If you want to find
Crynwr sells support for free software  | PGPok | injustice in economic
521 Pleasant Valley Rd. | +1 315-323-1241       | affairs, look for the
Potsdam, NY 13676-3213  |                       | hand of a legislator.
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to