On Wed, Jan 17, 2007 at 12:45:37AM +0100, Arnold Daniels wrote:
> Hi,
> 
> First of all I admit I'm no PHP security expert or PHP internals expert
> or anything, so please don't flame me if I say something stupid.
> 
> Wouldn't simply adding a flag to allow url's (which includes all '*://'
> streams), in functions that opens streams be enough? For example:
> fopen($file, 'r') and fopen($url, 'ru') and fopen('php://output', 'ru').
> To my opinion, using '*://' streams is an advanced feature. Developers
> who are using that, should be able to make sure no urls are opened.
> Again, just an idea.

Brilliant. The only thing that need be added is a config var to control
the default behaviour - which should be 'don't allow'.
Doesn't fix everything (eg includes), but it is a good start.
Note that: allow_url_fopen is not the same thing as that does not allow
the program to specify when it wants it.

> Last, I'm a software developer at a shared hosting company. To my
> opinion, making sure that users don't touch other people's files, does
> not belong in the PHP layer. With other apache modules you can do nasty
> thing as well. We (not me) have written a kernel patch to allow
> switching of the current processes (much like sudo) and a matching
> apache module. Since the privileges only allow the user or group to
> access the file, linux does the rest. An other solution is to start PHP
> as cgi under the correct user, but other things will never be really save.

Care to share that with the world ?

-- 
Alain Williams
Linux Consultant - Mail systems, Web sites, Networking, Programmer, IT Lecturer.
+44 (0) 787 668 0256  http://www.phcomp.co.uk/
Parliament Hill Computers Ltd. Registration Information: 
http://www.phcomp.co.uk/contact.php
#include <std_disclaimer.h>

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to