On Tue, May 7, 2019 at 9:05 PM Stanislav Malyshev <smalys...@gmail.com>
wrote:

> Hi!
>
> > b) update the security policy (https://wiki.php.net/security) to state
> that
> > open_basedir bypasses are not security issues. I believe this has been
> part
> > of Debian's security policy for some time already.
>
> I think we've been treating them this way effectively for a while now.
>
> The big question is how we formulate what open_basedir actually *is*. I
> mean, some people find it rather useful, and in some situation such
> mechanism can be very valuable - one scenario I can think of it turning
> on open_basedir, run through application test suite and check that it
> doesn't reach anywhere it should not. It, of course, does not provide
> security guarantees, neither do unit tests, but we still find unit tests
> useful, and in the same vein people may find open_basedir useful.
>
> So before just swinging the ax and dropping it I think we should really
> research what people are actually using open_basedir for. And then try
> to formulate a proper description of what it can be used for without
> claiming any security guarantees we could not deliver.
>

Right. One practical question that would interest me in particular is if we
can drop the implicit disabling of the realpath cache if open_basedir is
enabled. It makes open_basedir trivially bypassable, but still requiring
some specially crafted code -- not something that just happens by accident.
If we see open_basedir as a non-security feature for detecting code that
accidentally tries to access things it shouldn't, that should be fine. But
I'm not quite sure if that's the right interpretation.

I don't really care myself whether open_basedir exists or not, I mainly
want users (and ourselves as well) to understand what the intended usage
and limitations are.

Regards,
Nikita

Reply via email to