I'm afraid I stand by my answers bar one:

re the recent security scare: quote from the php.net "It is known that
Apache (any version) and iPlanet servers are vulnerable to this issue,
however Microsoft IIS is not."  This person states he is using IIS.

re PHP being "as secure as the pages you program" - not really a server
security issue is it?  If he wants to put a link saying "read all my
passwords" then that's his business.

re the POST vulnerability, I'll retract my comment on that

-----Original Message-----
From: Bryan Henry [mailto:[EMAIL PROTECTED]]
Sent: 02 April 2002 18:25
To: [EMAIL PROTECTED]
Subject: RE: [PHP-WIN] Configuring securely in IIS5 under Windows 2000
Server


>>All PHP does, is create a dynamic webpage, ie create a web page
>>"on-the-fly". This does not expose any holes any more than creating an
html
>>page does.

not true - PHP is as secure as the pages you program.
lack of user input verification is a good example.

>>There was recently a scare at php.net where a security loophole
>>was found, but it didn't concern windows users I believe.

not true - it affected any server running PHP v3.0.10-v3.0.18, v4.0.1-v4.1.1
with at least one .php file on it.  Everyone was encouraged to upgrade to
4.1.2

>>Because the PHP development is a very much open-source project,
>>any holes are spotted and repaired much faster than, say, a
>>hole was discovered in IIS.

Again, the bug was spotted years ago, supposedly by some hacker community.
It was just not reported and fixed until the 4.1.2 release.

->the POST vulnerability is covered here.
->http://security.e-matters.de/advisories/012002.html

->using the php binary to read and execute files on windows.
->http://www.php.net/release_4_1_2_win32.php
->[ this was not a problem for IIS you will be running ]

~ b r y a n


-----Original Message-----
From: Ross Fleming [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, April 02, 2002 10:51 AM
To: Eric Gentry; [EMAIL PROTECTED]
Subject: RE: [PHP-WIN] Configuring securely in IIS5 under Windows 2000
Server


So far as I'm aware, you're correct, secure IIS and php is secure as well.
I once saw a report in a security website or magazine (i think the latter)
complaining that PHP was insecure in so much that variables were posted with
the header details and could therefore be intercepted.  This in itself is
not so much a problem of PHP, and can be worked around by using sessions I
believe.  All PHP does, is create a dynamic webpage, ie create a web page
"on-the-fly".  This does not expose any holes any more than creating an html
page does.  There was recently a scare at php.net where a security loophole
was found, but it didn't concern windows users I believe.  Because the PHP
development is a very much open-source project, any holes are spotted and
repaired much faster than, say, a hole was discovered in IIS.

Can anyone else confirm this with me?

Ross

-----Original Message-----
From: Eric Gentry [mailto:[EMAIL PROTECTED]]
Sent: 02 April 2002 16:28
To: [EMAIL PROTECTED]
Subject: RE: [PHP-WIN] Configuring securely in IIS5 under Windows 2000
Server


Bruce,

Thanks for all of you input, it is much appreciated it.

I do know about securing IIS, but I was concerned about security when
adding PHP into the mix.

>From the answers I received, I am assuming that the security is in the
OS/Server software, and that there aren't any inherent security measure
to be taken with PHP?  In short, if the OS/web server is fairly secure,
PHP does not break that, correct?  That is my main concern.

Thanks,
Eric


-- 
PHP Windows Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to