Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:12303 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 46805 invoked by uid 1010); 23 Aug 2004 13:52:51 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 46717 invoked from network); 23 Aug 2004 13:52:50 -0000 Received: from unknown (HELO vscan02.westnet.com.au) (203.10.1.132) by pb1.pair.com with SMTP; 23 Aug 2004 13:52:50 -0000 Received: from localhost (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with ESMTP id 44F5611A7D9; Mon, 23 Aug 2004 21:52:49 +0800 (WST) Received: from [192.168.1.100] (dsl-202-72-137-155.wa.westnet.com.au [202.72.137.155]) by vscan02.westnet.com.au (Postfix) with ESMTP id 8A060118457; Mon, 23 Aug 2004 21:52:48 +0800 (WST) In-Reply-To: References: <0ADA645E-F4F3-11D8-AC67-0003939D6C78@westnet.com.au> Mime-Version: 1.0 (Apple Message framework v619) Content-Type: text/plain; charset=US-ASCII; format=flowed Message-ID: Content-Transfer-Encoding: 7bit Cc: internals@lists.php.net Date: Mon, 23 Aug 2004 21:52:48 +0800 To: Derrell.Lipman@UnwiredUniverse.com X-Mailer: Apple Mail (2.619) Subject: Re: [PHP-DEV] SQLite security From: aqsalter@westnet.com.au (Adam Q) On 23/08/2004, at 9:22 PM, Derrell.Lipman@UnwiredUniverse.com wrote: > Adam Q writes: > >> I think encryption for SQLite is essential for PHP. Without it, it >> makes it >> almost useless in a webscripting language. Suppose you wanted to >> create an >> open source, easily portable, file based guestbook in PHP. I would >> never use >> SQLLite under the current circumstances... Although I would love to. >> It >> seems like the perfect solution. >> >> The database needs a password.... otherwise it is just too much of a >> security risk. > > Others have commented on where the database should (or shouldn't) be > located > to avoid these problems. If the server environment is so inadequately > maintained as to put database files in locations where they might be > downloaded, then I would contend that it would not be a difficult job > to > manage to download the PHP or other data file which contains the > username > I can see I've touched a nerve here. Has nobody d/l PHPNuke, PostNuke, phpMyAdmin, Mambo... On and on the list goes on? They all put their DB access data in a file called "config.inc.php" (or something like that). (ie database passwords and general config data) But they protect it by including something along these lines: so even if you know where this file is in your web tree e.g. http://www.example.com/db_admin/config.inc.php all you get when you put it into a web broswer is a blank page. Is this insecure? Please don't give me a flat yes. The answer lies behind a thousand veils of shade. phpMyAdmin consistently is in the top 10 projects on sourceforge. Is this method insecure? (yes, they drone) Then why do the phpMyAdmin developers go ahead with it? Because it works. Simple. PHPNuke has a community in the hundreds of thousands. Is this method insecure? (yes, yes, yes) PostNuke ditto? (yes, yes, yes) Mambo too? (yes, yes, yes) I've forgotten because there are so many out there on hotscripts.com? (yes, yes, yes) And finally, imagine if I used an SQLite DB to store this data... But we've been there before. Thank you for the information regarding the encryption. I don't have the knowledge or skills to include this into PHP 5, but I appreciate the information - for one thing it means I'm not going crazy, other people have had the same idea. Adam