Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72398 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 70775 invoked from network); 8 Feb 2014 11:49:20 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 8 Feb 2014 11:49:20 -0000 Authentication-Results: pb1.pair.com smtp.mail=lester@lsces.co.uk; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=lester@lsces.co.uk; sender-id=unknown Received-SPF: error (pb1.pair.com: domain lsces.co.uk from 217.147.176.204 cause and error) X-PHP-List-Original-Sender: lester@lsces.co.uk X-Host-Fingerprint: 217.147.176.204 mail4.serversure.net Linux 2.6 Received: from [217.147.176.204] ([217.147.176.204:36675] helo=mail4.serversure.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 0F/60-65299-EB916F25 for ; Sat, 08 Feb 2014 06:49:19 -0500 Received: (qmail 9110 invoked by uid 89); 8 Feb 2014 11:49:15 -0000 Received: by simscan 1.3.1 ppid: 9103, pid: 9106, t: 0.0745s scanners: attach: 1.3.1 clamav: 0.96/m:52 Received: from unknown (HELO linux-dev4.lsces.org.uk) (lester@rainbowdigitalmedia.org.uk@81.138.11.136) by mail4.serversure.net with ESMTPA; 8 Feb 2014 11:49:15 -0000 Message-ID: <52F61A78.1020401@lsces.co.uk> Date: Sat, 08 Feb 2014 11:52:24 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:26.0) Gecko/20100101 Firefox/26.0 SeaMonkey/2.23 MIME-Version: 1.0 To: PHP internals Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Subject: Security Diligence From: lester@lsces.co.uk (Lester Caine) I think an explanation of my recent posts is probably due. The bulk of my income is from council and other local authority customers who are required to jump through many often difficult to identify hoops. They are currently being put through another round of 'security assessments' and I had a second visit to a site which we have yet to upgrade from PHP5.2 earlier this week. The system is doing exactly what the 'customer' wants ( the client is the customer services team ), and while the IT department has been providing network access since it was installed in 2007, it has no outside access other that a VPN/VNC link so I can carry out maintenance. As a result it has not been necessary or easy to upgraded to later 'security patches'. It's the last of my 'CMS' sites that I have to upgrade to PHP5.4 and that was the discussion before Xmas, but the IT department have now realised that they should be managing the network better :) Driven by their current security assessment, linked to removing Windows XP from it. Since two of the CMS machines are running XP, these will need to be replaced, but it is the Apache/PHP stack which the 'security consultant' has been targeting insisting that only a CURRENT version of both will be acceptable, and PHP5.4 is not current in his eyes despite it getting security updates independent of PHP5.5. I am more than happy that within the constraints applied I have maintained the PHP5.2 setup as 'safe' as I can and since these sites are all ring fenced inside the site network personally I do not see a problem. This view is actually supported by the IT staff, it is the independent consultant who is now putting up objections to our continuing to supply the CMS service. Unpatched reported security problems are one of his objections and timed attack was one brought up probably because it's discussion is currently happening! We are currently trying to work out how to move forward, and since the service provides an essential part of the handling of visitors there is a desire by the users to maintain it ;) Why is this all so futile? The system is still using the same 4 digit 'pin number' to identify a staff id that was instigated when the system was first designed back in 1992, and when many access positions were just numeric pads with small displays! No sensitive data is stored ... ( Firebird's password is still limited to 8 characters for historic reasons, so the length is a known and the hash decode is designed to check all characters even if an earlier compare fails ... so maintains a fixed test time ) -- Lester Caine - G8HFL ----------------------------- Contact - http://lsces.co.uk/wiki/?page=contact L.S.Caine Electronic Services - http://lsces.co.uk EnquirySolve - http://enquirysolve.com/ Model Engineers Digital Workshop - http://medw.co.uk Rainbow Digital Media - http://rainbowdigitalmedia.co.uk