Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:107869 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 27090 invoked from network); 27 Nov 2019 00:26:49 -0000 Received: from unknown (HELO php-smtp3.php.net) (208.43.231.12) by pb1.pair.com with SMTP; 27 Nov 2019 00:26:49 -0000 Received: from php-smtp3.php.net (localhost [127.0.0.1]) by php-smtp3.php.net (Postfix) with ESMTP id 3B0952D2084 for ; Tue, 26 Nov 2019 14:21:34 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp3.php.net X-Spam-Level: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS3215 2.6.0.0/16 X-Spam-Virus: Error (Cannot connect to unix socket '/var/run/clamav/clamd.ctl': connect: Connection refused) Received: from mail-pf1-x434.google.com (mail-pf1-x434.google.com [IPv6:2607:f8b0:4864:20::434]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp3.php.net (Postfix) with ESMTPS for ; Tue, 26 Nov 2019 14:21:33 -0800 (PST) Received: by mail-pf1-x434.google.com with SMTP id s5so9871978pfh.9 for ; Tue, 26 Nov 2019 14:21:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:autocrypt:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=W6Z7vpo8zvGKfq2LC3EPVP6txavZ2YuNPmRRuf8J+zk=; b=tZWHyUwe/+U+5bKTo2c23/11qboRRs/kJp8hFRPlIVlMfqcfTxVOdkhsYmSYksm60o WIJaxMU/oTdG+623ZeDbyjKP05jlowLRvio7642EKQhx+Tsus7/pQab9gHzncyh1jG6O jrj0dPdMs12MzWd4LwEsf2WTEkHvHRVutLabGiN+c0iwG7DTLVC934DUy/PADtCNCVhu kL8gfCXB1z8q61OvpwEKSf2Jh93RvnrAqhq4K8X7PVtObP1RVsf3YdK9it6uG9IX41y/ 79XsGOJoSgtXyiSGzn8m6DOxJdemJhJaNaSvBHBp4wGCrmu+dgv8L8yC19heZ7VSuRER uDqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:autocrypt:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=W6Z7vpo8zvGKfq2LC3EPVP6txavZ2YuNPmRRuf8J+zk=; b=TfBWrPMipT+CR0XXOQwiLL9n1YP/02om8/ldOkDdRViHqA11gfuUF4vTbU2sGzPtbS al8coBW1cwVJKSMPwfIUtNW0XDrL7XVTAPskWEg+DsyOrwIKByDA9NeBCyFi0rISPhSn dqZ4RXFDvS8nfWbHRvBIpxcEAcjLRCOROq8xGbDOv8OwFTDMBrtPpVO1PPgvuyuWl8iv VtN4BLhZF8u5NxQa6Xv/aBg15fQzrVgIN+aO0C+S3/NWqrS6n5A4RDEkwzHziaajobUv 2tprTZfOyRo/RYxJZFVhFQltQKtxGSi3p1StB9/vGqWQZiX0jfxmqVLmZI1n8hotRaZS Z7eg== X-Gm-Message-State: APjAAAUxCcTbCOseXkcq1sKpzHQM/AQDJQ+7Xf6I3iRoun4GYXfzmZn+ n0D3AoakRc4ByTUQEhiHioLyA+8ISQ== X-Google-Smtp-Source: APXvYqzOJ9viyHH+Ey6QGesY+eZQL6U6Iq3FUTXlU/6hLGN1hHEmmTsrQXaQKwCIFA94xM/Z8rejSA== X-Received: by 2002:a62:7a8a:: with SMTP id v132mr44081787pfc.228.1574806891919; Tue, 26 Nov 2019 14:21:31 -0800 (PST) Received: from Stas-Mac.local (ec2-34-209-88-149.us-west-2.compute.amazonaws.com. [34.209.88.149]) by smtp.gmail.com with ESMTPSA id n12sm12806715pgb.32.2019.11.26.14.21.30 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 26 Nov 2019 14:21:31 -0800 (PST) To: Ian Littman , internals@lists.php.net References: Autocrypt: addr=smalyshev@gmail.com; prefer-encrypt=mutual; keydata= xsJuBE9mqaARCACFSqcGmNunkjQQu3X+yXnTmFeEkvM4JXZTOBdR8aEevNGmmFEfyvjaDjWi 9hcwp4E/lYtC+P7VsVjM1OSX9eq0jC/lGL0ZyRXek+mNy0n5H1NSuTpf9Y18LMqhc4G+RU+L cNiZ9K0DJuOOvNLPxW7OHZguxb3wdKPXNVa2jyRfJAKm2uaJJMT1mTmFT9a0Q8SKr+mUrrJk uG0H2o6SzrKt8Wwoint1eh67zVsJaJtQFchnEZnlawIcqP2yC4nLGR3MkubowxoEBYCZet18 aHVVRbvpG2Qtob8Lu5xrsGbmXymTkHTdpvkfcJFADa8MzOL90zOxXwbGfbIZOlh5En8jAQCX lfnx2eQL3BSW/6XANa51dbWiEp1d1BAkpGKtZvlk0Qf+M9WAi+9aXMe3xP5krxtgnRNUf2WN 6Zdy2MxL1RRJCFbytLhl0ronC49BsGYVGshdEH8xhBbiIOJKuVZ/DTl9bEm7P9c7CC7iJyVC khUAhouH6xzZQNLR+RU+QebYzXypVfl99Qk7EdMmr/WAZCHLuvanyqepC5EBsa3VnAfQemSN oBeGBKWWLiOsPjvS72+y1z4RUMAfXHn4l/sFMt8zt7/74AmJPwZquV41p4mPO12V4+xPyc6R sB84sfsk2QVivU8w8AkvGQeYjXoz7Iwao95+fWteVzZ36KRQvUckP8pGjHlDXnHxJ0HI1I/k OBZSjwRwUf0dd73y6erPhbLk+gf+NdI3H9KGJBzG5/rVyWKwUeQ9d5ud4jTJRkQGvAP5pg76 vEa9dogbpe4W5Z+0BfbiJSnQmQWSHiZddj/t33ptbup44Ck6ZTgdlmFYMLF1hR47PIZTDKER EuKYGci/vq8snZvEJP9YCw/TtiHcMdrMKcY/+Lp8lQO0GHLPB9glVhnC0db6l1Xpg1CMI8/R ozBMcij30EgATggC/y2zbiqAFoS9FN9nXPbe4phStqABEyeZ+nXudt7PUYTjVgcrqo8bHZCi sBobWC7OnKyUzxVxzUeuPkIfmZuzkLaMw2McQdvwwsNvQ0DzaLP30c1Xsm/7EIYJcOWpzlVJ 5QrdmE0/Bc0yU3RhbmlzbGF2IE1hbHlzaGV2IChQSFAga2V5KSA8c21hbHlzaGV2QGdtYWls LmNvbT7CegQTEQgAIgUCT2aqtAIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQL3lW vF2gS12XMwD9HuRIolSwIK77u8EY461y2u6sbX36n5/uo/LDQuxoi3sA/0MvpnvzOhv9Iufv vsZEj3E7i3h+iD5648YMwfTFCij+zsFNBE9mqaAQCADfZPMpjZkkGZj3BY/7ApoLq4mwqzbh +CpLXwNn20tFNvSXfb8RdeXvVEb7Scx+W9qYpiaun2iXJgCVH8fgpZpR856ulT1q6uCG++CX ubEvip/eJkZl93/84h04KQJwsgOrAh0Om3OePRn8Pr+++0LNS0EL8uX/YHeTOGOnnmTqYTey SBVFdov6L4mepddfjekicKQqhL7mZh/xuq29JijT0uNNX8v4vDWQDu5dlAcdd+uB3gcXMD/P ginD11zp+6wtrWCm/+yBqpvDwXQX5PGUnwvbRfl7Ay3MmwmoXiecZMg0dwTSc7e0lhB4HGRH ZdBMJB4rHUVGdzqujK/ctOvrAAMFB/0Utb76Qe6sCMlHxVAmeE/fbo7Pi05btZ/x01r67dHf aMSP0riCKJ7M0OW+jAXtu9+z/BVnYisW67WWfxl2cS5tZDgiHgJARXWUOO72+sScHP8KQmTl 1z16gyKbwY3SmyBkwcpOL35nhUWNLy93syPoY6sZUTikr2bZYukHDQ33XBPs4e6MbWKfsa9q aVmnlOF3k5UqChjutfHaEa4Q7VP4wBIpphHBi9MI16oJIzzBPbGl2uoedjwiZ6QeQZnSuOVY ZxU2d3lRA8PrtfFN1VSlpEm/VcAvtieHUYWHN0wOu+cp3Slr5XJVNjTjJhl28SlinMME54mK AGf2Ldr/dRwXwmEEGBEIAAkFAk9mqaACGwwACgkQL3lWvF2gS126EQD/VVd3FgjLKglClRQP zdfU847tqDK4zJjbmRv5vLLwoE0A+wbrQs7jVGU3NrS0AIl5vUmewpp2BKzSkepy23nWmejw Message-ID: <05388310-2c80-2b42-a564-0fda2b6a2396@gmail.com> Date: Tue, 26 Nov 2019 14:21:30 -0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Envelope-From: Subject: Re: [PHP-DEV] Let's allow eval() to be turned off in PHP 8 From: smalyshev@gmail.com (Stanislav Malyshev) Hi! > Let's just say that eval() and create_function() are the cornerstone of > PHP-based exploit toolkits. Yes, if the hackers get in there are other > problems with your codebase, but as a defense in depth measure most > applications need neither create_function() nor the eval() language > construct, so they might as well be disabled. I get defense in depth, but I don't understand what it means in this case. Since you're talking about disabling functions, I assume we're talking about the situation where there's code execution access. From that point, you can execute any code. What is the value of disabling eval() here? You don't need eval, you can run any code you want directly! Am I missing something here? -- Stas Malyshev smalyshev@gmail.com