Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72804 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 47388 invoked from network); 25 Feb 2014 06:47:30 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 25 Feb 2014 06:47:30 -0000 Authentication-Results: pb1.pair.com header.from=smalyshev@sugarcrm.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=smalyshev@sugarcrm.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain sugarcrm.com designates 67.192.241.163 as permitted sender) X-PHP-List-Original-Sender: smalyshev@sugarcrm.com X-Host-Fingerprint: 67.192.241.163 smtp163.dfw.emailsrvr.com Linux 2.6 Received: from [67.192.241.163] ([67.192.241.163:47438] helo=smtp163.dfw.emailsrvr.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 4C/91-34115-18C3C035 for ; Tue, 25 Feb 2014 01:47:29 -0500 Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp6.relay.dfw1a.emailsrvr.com (SMTP Server) with ESMTP id BF8C62702B0; Tue, 25 Feb 2014 01:47:26 -0500 (EST) X-Virus-Scanned: OK Received: by smtp6.relay.dfw1a.emailsrvr.com (Authenticated sender: smalyshev-AT-sugarcrm.com) with ESMTPSA id BC3AB27030B; Tue, 25 Feb 2014 01:47:25 -0500 (EST) Message-ID: <530C3C7B.8080907@sugarcrm.com> Date: Tue, 25 Feb 2014 08:47:23 +0200 Organization: SugarCRM User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.3.0 MIME-Version: 1.0 To: Yasuo Ohgaki CC: "internals@lists.php.net" References: In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] Resolution for ver_export()/addslashes() encoding based script execution attack? From: smalyshev@sugarcrm.com (Stas Malyshev) Hi! > This is incorrect. PHP supports SJIS and others even in engine. I am not sure what kind of support you're referring to, what support the engine has for SJIS? Do you mean input filters? Those are just to read script code, AFAIK, aren't they? I think we need to face the fact that the scenario you are proposing is at least perceived as a rare case which is encountered in rare environment and is enabled by a shoddy code. Thus, proposing global-level engine changes for it are unlikely to gain consensus. Looking at the RFC, it makes claims of addslashes etc. being insecure, and other functions being insecure and unreliable, without giving proper examples and explanations of the context. I have a feeling that once people learn the context, they feel the claims in the RFC are overreaching and the solution proposed makes too many changes for the case that is perceived as too rare and need sloppy coding to enable. I would suggest to go back to the use case here and consider this: 1. Do we have a use case that is hard to handle in user's code? 2. What exactly makes it hard to handle - which capabilities for the user are missing? Is it access to certain information, certain algorithms, lack of knowledge? 3. What is the minimal set of actions we'd have to take to make it easier? What is the set of actions that would cover 80% of user's needs? I think once we have that, we have better chance at arriving at some resolution that would be more acceptable. -- Stanislav Malyshev, Software Architect SugarCRM: http://www.sugarcrm.com/ (408)454-6900 ext. 227