Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72796 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 80618 invoked from network); 24 Feb 2014 14:09:45 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 24 Feb 2014 14:09:45 -0000 Authentication-Results: pb1.pair.com header.from=me@rouvenwessling.de; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=me@rouvenwessling.de; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain rouvenwessling.de designates 5.35.242.46 as permitted sender) X-PHP-List-Original-Sender: me@rouvenwessling.de X-Host-Fingerprint: 5.35.242.46 rouvenwessling.de Linux 2.6 Received: from [5.35.242.46] ([5.35.242.46:41935] helo=lvps5-35-242-46.dedicated.hosteurope.de) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id AF/B0-10285-8A25B035 for ; Mon, 24 Feb 2014 09:09:45 -0500 Received: by lvps5-35-242-46.dedicated.hosteurope.de (Postfix, from userid 5001) id C751B69F14A9; Mon, 24 Feb 2014 15:09:41 +0100 (CET) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on lvps5-35-242-46.dedicated.hosteurope.de X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham version=3.3.1 Received: from rouvens-air-7.localdomain (xdsl-78-35-249-173.netcologne.de [78.35.249.173]) by lvps5-35-242-46.dedicated.hosteurope.de (Postfix) with ESMTPA id 3F45A69F04AF; Mon, 24 Feb 2014 15:09:41 +0100 (CET) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\)) In-Reply-To: Date: Mon, 24 Feb 2014 15:09:40 +0100 Cc: Yasuo Ohgaki , Andrey Andreev , "internals@lists.php.net" Content-Transfer-Encoding: 7bit Message-ID: References: <5302ABF6.60407@sugarcrm.com> To: Marcel Araujo X-Mailer: Apple Mail (2.1822) Subject: Re: [PHP-DEV] [VOTE] Secure Session Module Options/Internal by Default From: me@rouvenwessling.de (=?iso-8859-1?Q?Rouven_We=DFling?=) On 24.02.2014, at 15:05, Marcel Araujo wrote: > And about to remove these options, should they be keep in the newest > releases? > > ; http://php.net/session.bug-compat-42 > session.bug_compat_42 = Off > > ; session value into the global space. session.bug_compat_42 must be > enabled before > ; http://php.net/session.bug-compat-warn These have been removed in PHP 5.4. Best regards Rouven