Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:3581 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 17518 invoked from network); 23 Jul 2003 17:57:37 -0000 Received: from unknown (HELO thot.infomex.pl) (195.205.200.1) by pb1.pair.com with SMTP; 23 Jul 2003 17:57:37 -0000 Received: by thot.infomex.pl (Postfix, from userid 766) id 358D3275A3; Wed, 23 Jul 2003 20:04:13 +0200 (CEST) Date: Wed, 23 Jul 2003 20:04:13 +0200 To: internals@lists.php.net Message-ID: <20030723180413.GE79634@thot.infomex.pl> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-2 Content-Disposition: inline User-Agent: Mutt/1.4.1i Subject: open_basedir new feature From: drg@infomex.pl (Pawel Maziarz) Hi there. I've written a little patch, which enables admin to use a special char ~ in open_basedir variable which is placed in php.ini. ~ is replaced with script owner's home directory. i think it's useful security hack. patch: http://dev.segv.cc/devel/patch/php-4.3.2-open_basedir.patch cheers, Pawel Maziarz