Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72428 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 13433 invoked from network); 10 Feb 2014 07:26:05 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 10 Feb 2014 07:26:05 -0000 Authentication-Results: pb1.pair.com smtp.mail=pthreads@pthreads.org; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=pthreads@pthreads.org; sender-id=unknown Received-SPF: error (pb1.pair.com: domain pthreads.org from 74.125.82.47 cause and error) X-PHP-List-Original-Sender: pthreads@pthreads.org X-Host-Fingerprint: 74.125.82.47 mail-wg0-f47.google.com Received: from [74.125.82.47] ([74.125.82.47:35786] helo=mail-wg0-f47.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id DF/00-12747-B0F78F25 for ; Mon, 10 Feb 2014 02:26:04 -0500 Received: by mail-wg0-f47.google.com with SMTP id m15so3815352wgh.26 for ; Sun, 09 Feb 2014 23:26:01 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=pJfiWdMRIgEecR6crFW7GlfNytRVPwGOAvx4UaDHDak=; b=FXfUwmOsufPK1eXB+SmcAiA32tIlt8PZeZg0Zoc1GYZ4OjORbOoK2FsKj+e+bLjpGx UIcE/GbNU/6JCJjUh7AKqBn8Gp4TAtRDnS9C1l5kzfhXEM0UpkfQE8glrT4iQ8GR+ixf yzMqGuJ+Xo7qgvAkljWEkP4CwzT6ykOI6AZtEInHKFw/LsyaL5OE5CAlBIV22mAznRXi mxmx62SWbG7/uNHJlOh+dOGq+3q97I5wALRxOvMU0PA5xgOmwa/csOCMTAqZmzT+CTAi Kb66Tt8wv501LKl0RG0tnqqmqf6V4VNb/vqvqcdFrYh+LjmmTTQ4HeJ7g/sLdEhbzXPf jT3g== X-Gm-Message-State: ALoCoQnKDJwhf6C8MsyauSbuSbYxJ5Mpa9TPk0vKKNqN4fAOoKPaw4AuZDibKdNjehJk0QpvyrER X-Received: by 10.180.19.69 with SMTP id c5mr9097707wie.7.1392017161397; Sun, 09 Feb 2014 23:26:01 -0800 (PST) Received: from [192.168.43.248] (188.29.164.151.threembb.co.uk. [188.29.164.151]) by mx.google.com with ESMTPSA id di9sm33781750wid.6.2014.02.09.23.25.58 for (version=TLSv1 cipher=RC4-SHA bits=128/128); Sun, 09 Feb 2014 23:26:00 -0800 (PST) Message-ID: <52F87F03.1080100@pthreads.org> Date: Mon, 10 Feb 2014 07:25:55 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130625 Thunderbird/17.0.7 MIME-Version: 1.0 To: Yasuo Ohgaki , PHP internals References: In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [VOTE] Multbye char handling - Remove vulnerability related tomultibyte short and long term From: pthreads@pthreads.org (Joe Watkins) On 02/10/2014 03:56 AM, Yasuo Ohgaki wrote: > Hi all, > > Current PHP has security issue that attacker may execute arbitrarily script > via encoding based attack. These 2 RFCs are for short and long term > resolution for this issue. > > > > Short term: Multibyte Char Handling > https://wiki.php.net/rfc/multibyte_char_handling > Add functions required to resolve security issues. CVE-2014-1239 > > > Long term: Alternative implementation of mbstring using ICU > https://wiki.php.net/rfc/altmbstring > We need multibyte feature as default. However, current mbstring has license > issues. Resolve license issues by alternative mbstring in the future. > Introduce mbstring-ng as EXPERIMENTAL module for further development, > testing, feedback from users. > > VOTE: 2014/02/10 - 2014/02/17 > > > > Please note that these RFCs are independent from whether PHP is going to > support Unicode in core or not. It's about how PHP provides required > features. Even when PHP supports UTF-8 as string encoding, these multibyte > features are required. Otherwise, encoding parameter/property is mandatory > for core multibyte support. We need to support existing applications long > term also. > > Since it is security related issue, please provide/propose alternative > resolution if anyone feels it is not the way to go. There must be feasible > resolution. > > Thank you for voting and/or alternative proposal! > Even though alternative is better to proposed during discussion period, > better alternative is welcomed at anytime. > > Regards, > > P.S. We are better to have comment field in RFC. It is not constructive > just voting "No" without reason/alternative. Alternatively, we may have rule > to post mail here explains the reason why. > > -- > Yasuo Ohgaki > yohgaki@ohgaki.net > I voted no, on both. The first rfc doesn't even contain a patch, so I have nothing to review, I don't much care what you think the reasons are for the change, I care what the code says, and there isn't any. The second RFC is based on an extension that was written 5 years ago and hasn't been touched since. Not good enough, nothing like good enough ... Cheers Joe