Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:83947 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 34842 invoked from network); 27 Feb 2015 01:31:09 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 27 Feb 2015 01:31:09 -0000 Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.216.181 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.216.181 mail-qc0-f181.google.com Received: from [209.85.216.181] ([209.85.216.181:33008] helo=mail-qc0-f181.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id A2/A9-32582-CD8CFE45 for ; Thu, 26 Feb 2015 20:31:08 -0500 Received: by qcxm20 with SMTP id m20so11749754qcx.0 for ; Thu, 26 Feb 2015 17:31:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:content-type; bh=LN23jvMd0r1iDStbipDHTPTViSeYiRuCIDgOCMXybCk=; b=aC3dTe0M9DJ2jiSM77yiLvCDbfGyDoYAR8WdAU4/fgx+Fhi2JffAhNcZ/n6P1AB9p1 DJXc8YrtbsQ2qcCl/x0w/G68/SzvfgZSUG2jzqCi0U6c516Mhm1Bxbg8p4rBUlzuBrPU gJC1FuVxwQ1uyCAPsZhoLwCJVH8NhO7G8yPN5HC7VcCkCMe0SfTgZPASLrCm8fhAs09K /1DN4CJk0QEIlY6+XH4KxeidUjvlqRPGT0TTDZgOXkhi2Fr3jstYfbMyBI8FKfJNseWH bu7YGZQ4kQiYARIOc0G5iMuO4pNHV1OpRrMi1Qyy4OPAmxreGugFWchtOqR4PZwCtUct 9Uxg== X-Received: by 10.140.148.17 with SMTP id 17mr9197010qhu.0.1425000665697; Thu, 26 Feb 2015 17:31:05 -0800 (PST) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.229.198.8 with HTTP; Thu, 26 Feb 2015 17:30:25 -0800 (PST) In-Reply-To: References: Date: Fri, 27 Feb 2015 10:30:25 +0900 X-Google-Sender-Auth: xK3Zi71UiH1Sm6M5WJwbNCydnUE Message-ID: To: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=001a1136ef967bd473051007d29f Subject: Re: [RFC][VOTE] Introduce script only include/require From: yohgaki@ohgaki.net (Yasuo Ohgaki) --001a1136ef967bd473051007d29f Content-Type: text/plain; charset=UTF-8 Hi all, On Thu, Feb 26, 2015 at 7:06 AM, Yasuo Ohgaki wrote: > Vote for script only include/require RFC is started. > This RFC closes one of the fatal security hole in PHP programs with > simple patch. > > https://wiki.php.net/rfc/script_only_include > https://github.com/php/php-src/pull/1111 > Vote ends 2015/3/12 > > It seems there are misunderstandings about the issue and the protection. > If you would like to vote "no", please read the RFC carefully. > If you find fatal reason to reject this RFC, it is about arbitrarily code > execution > and file exposure, so please let us know the reason why. > > If you have question, please ask. > I was thinking allow_url_include issue later, but it seems I have to now. I've written new RFC to address this. https://wiki.php.net/rfc/allow_url_include I'll start discussion shortly. If you have comments, please do so here. It's related to this RFC also. Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net --001a1136ef967bd473051007d29f--