Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:57292 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 41910 invoked from network); 9 Jan 2012 16:01:36 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 9 Jan 2012 16:01:36 -0000 Authentication-Results: pb1.pair.com header.from=nikita.ppv@googlemail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=nikita.ppv@googlemail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain googlemail.com designates 209.85.215.42 as permitted sender) X-PHP-List-Original-Sender: nikita.ppv@googlemail.com X-Host-Fingerprint: 209.85.215.42 mail-lpp01m010-f42.google.com Received: from [209.85.215.42] ([209.85.215.42:44854] helo=mail-lpp01m010-f42.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id A2/C2-24383-D5F0B0F4 for ; Mon, 09 Jan 2012 11:01:34 -0500 Received: by lagj5 with SMTP id j5so1514863lag.29 for ; Mon, 09 Jan 2012 08:01:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=NNuVAcbR3XYHB4ffev2WnMOotAF61sfQgZvyZx8VXU8=; b=Ek6vRW3um2TiQXzgt5ePPrA6drXyZnexLkdkkQdRTq5NH5/1N/Mj5HU0O8DzSDVAIJ K7kUNDVZKDjzOtabVgm/JqQtyez2FU588e6s1aN4bkYaSxf2CficeSiFxCo7rfmohe15 kpwBDbk92MaQQtl5iqU3Q4GVA0/xEOonaeB1Y= MIME-Version: 1.0 Received: by 10.152.124.137 with SMTP id mi9mr6942902lab.6.1326124888283; Mon, 09 Jan 2012 08:01:28 -0800 (PST) Received: by 10.152.18.197 with HTTP; Mon, 9 Jan 2012 08:01:28 -0800 (PST) In-Reply-To: References: Date: Mon, 9 Jan 2012 17:01:28 +0100 Message-ID: To: Pierre Joye Cc: PHP internals , =?ISO-8859-1?Q?Johannes_Schl=FCter?= , Laruence Content-Type: text/plain; charset=ISO-8859-1 Subject: Re: [PHP-DEV] 5.3.9, Hash DoS, release From: nikita.ppv@googlemail.com (Nikita Popov) On Mon, Jan 9, 2012 at 4:41 PM, Pierre Joye wrote: > hi, > > Moving this discussion here as it makes little to non sense to discuss > that any longer on security@ > > We are now very late behind an acceptable delay to provide a fix for > the hash DoS, to say it nicely. > > I'd strongly suggest to release 5.3.9 (RC5 has been tested now) final > this week using the max_input_vars fix, with the modification from > Laruence (but with a larger limit). Laruence addition also fixes > serialize or json, which are parts that need this fix as well as it is > impossible to valid a string manually (length check only is not enough > or cannot work in all cases). By laruence addition you mean this patch: https://bugs.php.net/patch-display.php?bug_id=60655&patch=max_input_vars.patch&revision=latest ? If so, two questions: 1. Why should all POST variables be counted into the limit, not only the ones in one nesting level? 2. How high would the limit for seriliaze() and json_decode() be approximately? I think that few applications will use more than 1000 POST vars but I could well imagine that they have large serialized arrays. Putting the limit too high on the other hand will pretty much defeat the purpose of the fix. > But 1st of all, the fix addition has to be applied and fully tested. > But if the addition is not desired yet, then we must at least release > 5.3.9 with Dmitry's fix only and we can fix json&serialize later, > ideally within 2 weeks max. I'd prefer that. Don't think that it's wise to apply a different fix shortly before the release.