Re: AW: AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-25 Thread Marcus Boerger
Hello Matthias, could you please change to an email client that doesn't scramble the message id's? marcus p.s.: this issue nerves a lot since we loose context. And from time to time it has to be mentioned it seems :-) Friday, November 25, 2005, 1:33:12 PM, you wrote: >> >> I have always main

Re: AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-25 Thread Rasmus Lerdorf
Matthias Pigulla wrote: Well, safe_mode could prevent someone of doing a shell_exec("cat /home/otheruser/web/config.php"); open_basedir can't do the same thing. We were in a continual losing race against that sort of thing though. In pretty much every single release there have been ways to d

AW: AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-25 Thread Matthias Pigulla
> >> I have always maintained that shared hosts should be running > >> per-security context Apache instances as different users. > > > > The problem with that is that it makes name-based virtual > hosts pretty > > pointless because each apache instance will at least need an ip > > address on i

Re: AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-25 Thread Andreas Ahlenstorf
That's why you can't assure security... Please read: ... this special type of security... Regards, A. -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php

Re: AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-25 Thread Andreas Ahlenstorf
Am 25.11.2005 um 10:51 schrieb Matthias Pigulla: Because of bugs in the safe_mode implementation (forgetting some checks?) or conceptual problems? Safe mode doesn't work 'cos there are lots of third party libraries which PHP relies on and don't take care of the safe mode. That's why you c

AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-25 Thread Matthias Pigulla
> > Well, safe_mode could prevent someone of doing a shell_exec("cat > > /home/otheruser/web/config.php"); open_basedir can't do the same > > thing. > > > disabled_functions=shell_exec, etc But safe_mode is more safe because it disables these functions altogether? It's difficult to maintain

AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-25 Thread Matthias Pigulla
> > Well, safe_mode could prevent someone of doing a shell_exec("cat > > /home/otheruser/web/config.php"); open_basedir can't do the same > > thing. > > We were in a continual losing race against that sort of thing though. > In pretty much every single release there have been ways to > do th

Re: AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-24 Thread Andrei Zmievski
Actually, three: code blocks, interpolation of complex variables, and string indexing. - Andrei On Nov 24, 2005, at 3:22 AM, Jani Taskinen wrote: True. But having two purposes for {} is not good either. -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http:

Re: AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-24 Thread Jani Taskinen
On Thu, 24 Nov 2005, Matthias Pigulla wrote: Admittedly this is ugly to read but the same thing on the other side is $var[$x][$y] vs. $var[$x]{$y}. True. But having two purposes for {} is not good either. And most of the time it's up to the coders how they use the existing features

AW: [PHP-DEV] Re: PDM Meeting Notes

2005-11-24 Thread Matthias Pigulla
> -Ursprüngliche Nachricht- > Von: Jani Taskinen [mailto:[EMAIL PROTECTED] > We could start with making it an E_ERR..erm..E_STRICT notice > if you use {} with arrays or [] with strings. And really separate > them in PHP 6. But does it make any sense? At least some people