On Sat, Feb 4, 2012 at 11:32 AM, Pierre Joye <pierre....@gmail.com> wrote:
> On Sat, Feb 4, 2012 at 10:25 AM, Stefan Esser <ste...@nopiracy.de> wrote:
>
>> Grow up Pierre.
>
> here we go again... failed. next time....
>
>> See you do it again. You claim I believe EMET has been created because of 
>> Suhosin. I never said that. Although one of the lead developers of EMET 
>> compared it himself to it.
>> You know some features of Suhosin are already in PHP and the HTTP response 
>> splitting drama shows that when you break it there is a secondary layer of 
>> defense that protects you in case you use Suhosin.
>
> I was talking about the compilation security options which are similar
> (in some extends) to what Suhosin does (for some features).
>
>> Pierre it is time for you to come out of the delusional state. You 
>> repeatedly claim that everything is now superb.
>
> No, I said it is different and better than what you have experienced.
> And anyone active today in php.net can tell you the same.
>
>> Do you forget PHP 5.3.7 and PHP 5.3.9 both times there were security 
>> vulnerabilities introduced right after the last RC.
>> This is a sign that the PHP development process is still not healthy at all.
>
> So any software having security issues at one point or another is not healthy?
>
> I consider the opposite, I am very careful when I see a software
> without any discovered issues for a long time, a sign of lack of
> activities and users.
>
>> You claim I have personal issues, while I repeatedly tell you the technical 
>> reasons why I see it different then you.
>
> Sorry but I do not see technical issues in this thread, as in
> technical explanations about why one given feature is actually a good
> thing. I did not see any either in the past discussions.
>
I only say a few words and then i will be silent
I tend to agree with Linus on this one "Security people are insane"
http://kerneltrap.org/Linux/Pluggable_Security
If there is something that needs to be done so php core will be more
secure , make it in the core
Not words : write RFC(docs),patches with sane techincal disscussions
or a pluggable architecture with extensions and rules, something like
is done with LSM http://en.wikipedia.org/wiki/Linux_Security_Modules
or mod_security in apache

I vote with the Debian point of view , less patches means faster
releases for php also it means more security
and they are using the vanilla core (less suoshin related bugs to support)

The goal is : 0 patches and use upstream as much as possible

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to