PHP Listers,
        I was just reading about "Hardened PHP", and the debate between
those who thinks it's a good idea and those who think it will allow for
lazy coding. I'm firmly of the belief that any new security feature is a
good thing. If for no other reason that it will help me stay secure
while I am in the process of learning how to be more secure on my own.
        But one question that came up in my mind while reading about PHP
security is exactly where does the risk lie? Specifically, I wonder if
in my own case if there is much of a risk. I almost exclusively use PHP
to draw from data held within a MySQL database on the same server. I do
not allow users to upload files. I suppose the most that I allow users
to do is input some information like email addresses, user names and
passwords. But it seems to be harmless text that gets stored in the
database. I can't see how it could be manipulated to store and/or
execute a script of any kind.
        Are there open ports to access PHP that I don't know about?
Wouldn't someone have to be able to telnet in before doing anything with
PHP (and if they had got that far, would they even need PHP to do their
damage)?
        I must be missing something. It seems to me that all of what PHP
does, or at least what I use it for, all takes place on the server
without doors for user access. Either my use of PHP is limited to a
fairly small section of it's capabilities and so I don't encounter
risks, or there is some other route to access PHP functions that I'm not
aware of.
        Can someone please shed a little light on this matter? Naturally
I want to try and be as secure as possible.

-- 
Yoroshiku!
Dave G
[EMAIL PROTECTED]

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to