Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:130377 X-Original-To: internals@lists.php.net Delivered-To: internals@lists.php.net Received: from php-smtp4.php.net (php-smtp4.php.net [45.112.84.5]) by lists.php.net (Postfix) with ESMTPS id 6F7531A00BC for ; Mon, 16 Mar 2026 21:24:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=php.net; s=mail; t=1773696244; bh=pvae7hPzuFgg8w26rlcgwKUvRWgxURmmod+PEHM3zfo=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Cz2Ac7sSw6Qq0n/JqoUJC71DS3UwtWbFiyy+77C2zIMP955eROwfW+eT6Yoc3njb0 CajoSv9gtg8UeQRlXA+TcJSc1UYMb81M2Q3Z6S1GcoiyCOc4MXX6rxPgBlUPg3CzzV hm7sF5nkUsgNk1em6GSFZBAe0p6hNxCkqrSzUHMwvTS+YGuhN3wlZ3nWrvuud+ba/v 2CH2MPLg2ynC2WgUG3sVjdxlWnkI6YCnKfqLJyBgkNCEqEy/LE78NO4mUXkpIDia65 tUMvizBgSXCJPXnJ5oBp4EYiukr63tsX7Y4ofA2coMG2iTWeZqjfgOPDjHZaNtr8I/ HbdMOibxow0uw== Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 77840180050 for ; Mon, 16 Mar 2026 21:23:59 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-25) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=0.6 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_50, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,DMARC_MISSING, HTML_MESSAGE,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=4.0.1 X-Spam-Virus: No X-Envelope-From: Received: from mail-ua1-f42.google.com (mail-ua1-f42.google.com [209.85.222.42]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Mon, 16 Mar 2026 21:23:59 +0000 (UTC) Received: by mail-ua1-f42.google.com with SMTP id a1e0cc1a2514c-94b07fddecbso3263227241.1 for ; Mon, 16 Mar 2026 14:23:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1773696233; cv=none; d=google.com; s=arc-20240605; b=CXQpGZdm1LmDIxt/oaj95UaeCWOwQ6td01yVvmvrxE7gZxAWGnnapXLSwq5WctGtQx x/WksAygihmVahjA9MhlSyqsRh6bzMKd6TccUhGgey+Gr/FOTAE8Rapth/P4R6Wt/i3b 5NrVktN5yJRsqwt/nhWXHK3xB9W+Bc49OP/ibXUeXF68/oZrmXCZdn/tGdaa7d5JalvP UvfrDcqEMkzlieIZt18+Rdxr5o7M6pt3sKuCuDFQixAqSwgv7lWtU+8CZGHUORkxRbX0 iAlyssk51QyDME5IJarq9JUKJ/tNSKSOE7dDxSjXEy58tFOggwRrNd/Kqh1Mul0VJGDN qgBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=pvae7hPzuFgg8w26rlcgwKUvRWgxURmmod+PEHM3zfo=; fh=x0PJP2WUos5duDitD3mc9P93Hml9swP+eMIbQ+sydKs=; b=f4RsPAZ5StSiD1RhxFQ2o4ls4b99dpsjj6CYlWsM1t69ypPYWH65mjlDMbKxNsLUGq uOvuCD0gz3Ayya57GXevxAvpN6z5sRkFCN8n8/5q3jtfqSbbWE63ezAZq/OzxHnlKGss 2zILCQazYDcsfEi//Oig0aLtbnpjgj87OHVBQMbImnlwTA9kSfQ8qXgOOjJ+ps+cElB7 NRkRljb2F5hfKgFn6kF3e7jIfcbpq9908SQpD65csHQDbFywzfnYUd2cdKaqm17bXSm7 ofaT+oyLw6j8DGzagqqqH2/NTPa5bpCd+FBh0a78HVBzLc1xwqhBi7JsE8crMHR6lEaH x/gg==; darn=lists.php.net ARC-Authentication-Results: i=1; mx.google.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=devilix.net; s=google; t=1773696233; x=1774301033; darn=lists.php.net; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=pvae7hPzuFgg8w26rlcgwKUvRWgxURmmod+PEHM3zfo=; b=uZYsq2UYtPFeJcIn/T4mZIeCu9ljXoYl5m5bxfc365+ESXFHvNfwvxB8XVel4gtGZj tk6RK4t/8ri5gSUaocD+wbafLhAVQjyHmXlrbMkCxIL2agoqvplwOf9Z1YXRZERvLmG1 jjcGoQ6ylSpaiEMOK/SN14c/D9KAjjgB9QsRw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1773696233; x=1774301033; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=pvae7hPzuFgg8w26rlcgwKUvRWgxURmmod+PEHM3zfo=; b=EHHW9cabTbA8XPkeyw5NwNHpGT65ZN/4cRvrRyziBE6xHxr/dS7of6jSSuWC/ARoJK cPMmMDKF8qdKCfQO72LqpaeEher1s+p+0B7ptNC3KOvhI1jWPnoZ8x94yDbX7EvVwpOi kyG2Qn8+hnZZ+62HPa7oYbN+CDTA1/pPFmDDj+wkwhvKH2TSw2WoCC1n7p/Z/gPDnc8z B8Xek7M4tlz+G6frPgk5SPF0bpQtRKf4j6C7mavVfA0LpxUwP7jrKRKEyMiuOgE7tvLq P0joCrjHaznwfOKAttrIAETySYkO2Zx1OEx7jUOV+W4+2l5yaYSdG50D+64K6J15CGAd XC8Q== X-Forwarded-Encrypted: i=1; AJvYcCXygIhx5YftRqWtQgXjgXaigwl8xJC48fVpHeqGYBbhpMYzQ6yl/QztQhplpUhiEG1HRu9mDgZWUaE=@lists.php.net X-Gm-Message-State: AOJu0YxVl91MKhLTNWQ/njesLM8HB4ZWKuK46A24/rMi9TAS8Doae7d5 9Y5emwuJar4Z5Yhe9u6FLdWznYZ9II5zZwD0gOeTBdSg1CwUN8AjTMUEvlWX65pEkmAMluBIBUd Bd+5SFJPD3peYs8dheB7cJHsZ5RYJL18m/RJns4Z8 X-Gm-Gg: ATEYQzyiQBRFP9A2MXFZY/wigTQpOlzFttwVS+LLC0622Ii+/m5oMaPsNfTRoJ/si1I VQ+LQr21PoaCArsu4kJCUGHxKJll4jPDEheK7Zgy2inf31T4hlrjWUBsPysd1/eewrtzQE2hinE zqj7A7TydZrkaTnyL8zNSkpxCYnuPMdUs+qIDB/V+4PwEYWev5058JY9sU6CXg7zznooloOBe02 H/BsVZOkhp1eFzla6szvuBWL5BeECZP5Hb8jsJ6+kwKEGQeNn1XeY3mefp81wtetPZayn0YipU7 zEQQFapUtiAyZaWdQs7JtiQriSXrcTWbhW+Lm0EYiAle4lVRWx7sVQeY/EL8QwjXFXLx X-Received: by 2002:a05:6102:1623:b0:5ff:fbe4:89d with SMTP id ada2fe7eead31-6020e8b023bmr6574712137.20.1773696233375; Mon, 16 Mar 2026 14:23:53 -0700 (PDT) Precedence: list list-help: list-unsubscribe: list-post: List-Id: x-ms-reactions: disallow MIME-Version: 1.0 References: <939CFA28-A6FF-433F-85A0-B83345CEF4A6@cmpct.info> <6c498ed3-3cb0-47a5-a64e-4ad202eba141@bastelstu.be> <3E4944F8-EDAF-4FBA-89DA-1B22DC39AD8F@cmpct.info> In-Reply-To: <3E4944F8-EDAF-4FBA-89DA-1B22DC39AD8F@cmpct.info> Date: Mon, 16 Mar 2026 23:23:42 +0200 X-Gm-Features: AaiRm50mnYtZ_t0jZK4j-sQrecCp7ktMFVPNOeZQCmF6h-9zsweBTLaVcSOPMsY Message-ID: Subject: Re: [PHP-DEV] [RFC] Display Function Arguments in Errors To: Calvin Buckley Cc: =?UTF-8?Q?Tim_D=C3=BCsterhus?= , PHP internals Content-Type: multipart/alternative; boundary="000000000000ee187a064d2ad530" From: narf@devilix.net (Andrey Andreev) --000000000000ee187a064d2ad530 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Thu, Mar 12, 2026 at 5:59=E2=80=AFPM Calvin Buckley = wrote: > On Mar 11, 2026, at 7:06=E2=80=AFPM, Andrey Andreev wr= ote: > > > > > I want to add one more side-effect that feels discounted: PII and other > sensitive data leaking through logs. Partly what the INI setting is > supposed to address, but IMO it only does so on paper. > > I have dealt with that issue many times, and developers tend to either > not take it seriously or propose naive patchwork solutions such as > blacklisting patterns in already produced logs. Plus, there's an inherent > temptation to temporarily enable such settings for debugging purposes, no= t > realizing the act itself represents a data leak and it is permanent. If > this is a serious problem without args values being present today, imagin= e > the amplification effect from this addition. > > > > With that being said, I also know the pain of having to deal with > borderline useless error messages. The proposal isn't without merit, but > I'd look for alternative approaches that don't create security headaches. > > This is something I'm also concerned about, but I feel the cat is > already out of the bag with backtraces in exceptions providing the same > parameter information. PHP and the library ecosystem seem to be adopting > the sensitive parameter attribute, so my hope is that applications also > start adopting it. On one hand, it's true that the cat is already out of the bag. On the other, that's been the case since at least the days of PHP 4 and related effort since has been to limit the danger. This would be a first in the other direction. Semi-random idea: what if it was a declare statement instead of an INI? That would have multiple benefits: - Can limit the exposure to particular scripts rather than globally - Easy to spot during code reviews and therefore little danger of negligent leaks - Potential to consolidate backtraces under the same umbrella and eventually retire zend.exception_ignore_args Cheers, Andrey. --000000000000ee187a064d2ad530 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
On Thu, Mar 12, 2026 at 5:59=E2=80=AFPM Calvi= n Buckley <calvin@cmpct.info>= ; wrote:
On Mar = 11, 2026, at 7:06=E2=80=AFPM, Andrey Andreev <narf@devilix.net> wrote:

>
> I want to add one more side-effect that feels discounted: PII and othe= r sensitive data leaking through logs. Partly what the INI setting is suppo= sed to address, but IMO it only does so on paper.
> I have dealt with that issue many times, and developers tend to either= not take it seriously or propose naive patchwork solutions such as blackli= sting patterns in already produced logs. Plus, there's an inherent temp= tation to temporarily enable such settings for debugging purposes, not real= izing the act itself represents a data leak and it is permanent. If this is= a serious problem without args values being present today, imagine the amp= lification effect from this addition.
>
> With that being said, I also know the pain of having to deal with bord= erline useless error messages. The proposal isn't without merit, but I&= #39;d look for alternative approaches that don't create security headac= hes.

This is something I'm also concerned about, but I feel the cat is
already out of the bag with backtraces in exceptions providing the same
parameter information. PHP and the library ecosystem seem to be adopting the sensitive parameter attribute, so my hope is that applications also
start adopting it.

On one hand, it's tr= ue that the cat is already out of the bag. On the other, that's been th= e case since at least the days of PHP 4 and related effort since has been t= o limit the danger. This would be a first in the other direction.

Semi-random idea: what if it was a declare statement instea= d of an INI? That would have multiple benefits:
- Can limit the e= xposure to particular scripts rather than globally
- Easy to spot= during code reviews and therefore little danger of negligent leaks
- Potential to consolidate backtraces under the same umbrella and eventu= ally retire zend.exception_ignore_args

Cheers,
Andrey.
--000000000000ee187a064d2ad530--