Great!

I was just looking for confirmation that my assumptions in my original post
were correct. I have been using PHP for quite some time but have never read
a specific article about possible attacks that allow modification of values
in a class object or execution of functions in a PHP script. It is rarely
safe to assume things when it comes to security so I figured I would ask.

Thanks again for responding.

--Jacob


"John W. Holmes" <[EMAIL PROTECTED]> wrote in message
003801c2bd13$01fc85b0$7c02a8c0@coconut">news:003801c2bd13$01fc85b0$7c02a8c0@coconut...
> You already have your solution in your original question, then. If you
> don't want to use any of these other techniques, then name your files
> with a .php extension (I use .inc.php) and enclose everything in classes
> or function. If you're just aware that your included files can be run
> out of context, and program accordingly, your scripts will be just fine.
>
>
> An include file full of functions or classes will not "run" anything
> when called, it'll simply load it into memory.
>
> ---John W. Holmes...
>
> PHP Architect - A monthly magazine for PHP Professionals. Get your copy
> today. http://www.phparch.com/
>
> > -----Original Message-----
> > From: Jacob Copsey [mailto:[EMAIL PROTECTED]]
> > Sent: Wednesday, January 15, 2003 3:53 PM
> > To: [EMAIL PROTECTED]
> > Subject: Re: [PHP] Security in included PHP files
> >
> > I agree these are good solutions and I have considered them. However,
> I am
> > looking for an all-inclusive solution that is code only within PHP
> that
> > allows the admin of the application to copy the files to their server
> and
> > not need to do any server specific configuration. That is why I don't
> name
> > the included files with .inc. It would require configuration of the
> server
> > to prevent downloading of those files and I don't want to require that
> > step
> > of people who choose to run the app on their server.
> >
> > Thanks for the input!
> >
> > Jacob
> >
> > "Chris Shiflett" <[EMAIL PROTECTED]> wrote in message
> > [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > --- Jacob Copsey <[EMAIL PROTECTED]> wrote:
> > > > My style of PHP is to name all included files with a .php
> > > > extension and of course this raises the problem of people
> > > > accessing these script files directly.
> > >
> > > I always name included files *.inc myself, but that's a
> > > personal preference combined with a strong desire to adhere
> > > to strict naming conventions.
> > >
> > > It is very easy to make sure people cannot access your
> > > include files directly. There are two common ways to do
> > > this, and I will mention my preference first.
> > >
> > > 1. Do not store your include files under document root.
> > > This is a very simple and straightforward approach that
> > > negates all of the types of questions you were asking.
> > >
> > > 2. Deny access to any file with an extension of inc. Of
> > > course, you would have to conform to a naming standard a
> > > bit more for this to work. A quick Google search revealed
> > > this example for Apache:
> > >
> > > <Files ~ "\.inc$">
> > >     Order Allow, Deny
> > >     Deny from all
> > > </Files>
> > >
> > > Chris
> >
> >
> >
> > --
> > PHP General Mailing List (http://www.php.net/)
> > To unsubscribe, visit: http://www.php.net/unsub.php
>
>
>



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to