Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:57692 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 6132 invoked from network); 4 Feb 2012 10:13:31 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 4 Feb 2012 10:13:31 -0000 Authentication-Results: pb1.pair.com header.from=stefan@nopiracy.de; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=stefan@nopiracy.de; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain nopiracy.de from 81.169.146.161 cause and error) X-PHP-List-Original-Sender: stefan@nopiracy.de X-Host-Fingerprint: 81.169.146.161 mo-p00-ob.rzone.de Solaris 10 (beta) Received: from [81.169.146.161] ([81.169.146.161:24024] helo=mo-p00-ob.rzone.de) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 0D/DB-08838-9C40D2F4 for ; Sat, 04 Feb 2012 05:13:30 -0500 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; t=1328350406; l=2318; s=domk; d=nopiracy.de; h=To:References:Content-Transfer-Encoding:Cc:Date:In-Reply-To:From: Content-Type:Mime-Version:Subject:X-RZG-CLASS-ID:X-RZG-AUTH; bh=hU/9mOpEq42CAXfV8cconYSw7po=; b=yodVXfIV4gPhHU9WyalcHyBnl/ZC7ZDC20Sz58a0XKapTEhnIThB7q0nCeY3+HMwCTJ mIF9ZD8l3gc9wCngDr9pEwum3Q/F+h6FGUHpSKz/UpxHsayQhslYDpne8gqqHXcriSVjf yR55HARM//4zIefg+300xTUBVPU3BFSIPyw= X-RZG-AUTH: :OH4FY0Wkd/plSHgwfKFIgHoVYx5SSathkA9OvI+ii+JXGfvQUzm/Ahii7iullNGyVg== X-RZG-CLASS-ID: mo00 Received: from [10.23.17.42] (cable-78-34-71-151.netcologne.de [78.34.71.151]) by post.strato.de (mrclete mo36) (RZmta 27.6 DYNA|AUTH) with (AES128-SHA encrypted) ESMTPA id x044cao1488geT ; Sat, 4 Feb 2012 11:13:05 +0100 (MET) Mime-Version: 1.0 (Apple Message framework v1251.1) Content-Type: text/plain; charset=iso-8859-1 In-Reply-To: <4F2D01A0.3050000@sugarcrm.com> Date: Sat, 4 Feb 2012 11:13:04 +0100 Cc: PHP internals , "security@php.net" Content-Transfer-Encoding: quoted-printable Message-ID: <2AE2BBB6-2AAC-40D2-9083-6CB1DD95454A@nopiracy.de> References: <5FB5CFDA-6FE8-4C20-A9B9-7844ED96659B@nopiracy.de> <4F2A9378.70803@thelounge.net> <4F2AC9CA.2070308@sugarcrm.com> <4F2B2ED8.4050900@jimdo.com> <72878E6C-4C17-4D94-9F73-1446769247E1@nopiracy.de> <4F2CEA7E.9010906@sugarcrm.com> <9684A843-5A7F-43BB-BFC2-86F34E27EC3B@nopiracy.de> <4F2D01A0.3050000@sugarcrm.com> To: Stas Malyshev X-Mailer: Apple Mail (2.1251.1) Subject: Re: [PHP-DEV] Suhosin patch disabled by default in Debian php5 builds From: stefan@nopiracy.de (Stefan Esser) Hi, >> This is bad. And there is no point arguing this fact. >=20 > Yes, this was bad. Agreed. It was a mistake. Mistakes happen. We fixed > it and hopefully learned from it. Yes mistakes do happen to everyone and we all hope to learn from them. And some of us like to buy insurances so that there is protection in = case anything goes wrong. And because we know that everyone makes mistakes we add additional = layers of protection. In case of PHP this is Suhosin. In case of Apache this is mod_security. = In case of Linux it is better Grsecurity (and not the other stuff). And in case of webservers in general people buy web application = firewalls. >> These are all basic prinicples of security mitigations. Why is there >> a need to write up RFC about these things. They are widely accepted >> by other software vendors/products. >=20 > Because there's a difference between principles and applying them in a = particular manner in particular patch to particular software. The = responsibility of core PHP developers it to evaluate the specific = solutions and patches and decide if they are good or not. Regardless of = how well or badly it was done in specific cases in the past, this is = what should be done. If the author of the patch doesn't want to do this = - well, ok, so he would have his patch and we probably won't, unless we = find other ways to do it - maybe even the worst way possible, by having = security problem illuminate the need - but I see no way around it. The patches are available for everyone. You can download them at = http://suhosin.org - also everyone can use them for free. Everyone can = just take them and merge them into PHP. But it will not be me. As I previously stated I can live with a few = percent less performance or more memory usage due to memory canaries. = (The later can actually be largely improved and I have plans to do it = somewhen in the next months). However I know that memory canaries will = never go into PHP mainline. And knowing that tells me that I have to keep Suhosin anyway as a = project. And therefore people should use it. And all those that maybe cannot live with this impact can already use = Suhosin today and just disable the memory canaries via environment = variables.=20 Regards, Stefan