Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:86094 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 56710 invoked from network); 30 Apr 2015 14:35:49 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 30 Apr 2015 14:35:49 -0000 Authentication-Results: pb1.pair.com header.from=dennis@birkholz.biz; sender-id=unknown Authentication-Results: pb1.pair.com smtp.mail=dennis@birkholz.biz; spf=unknown; sender-id=unknown Received-SPF: unknown (pb1.pair.com: domain birkholz.biz does not designate 144.76.185.252 as permitted sender) X-PHP-List-Original-Sender: dennis@birkholz.biz X-Host-Fingerprint: 144.76.185.252 mx01.nexxes.net Received: from [144.76.185.252] ([144.76.185.252:59849] helo=mx01.nexxes.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id C1/40-51427-2CD32455 for ; Thu, 30 Apr 2015 10:35:48 -0400 Received: from [137.226.183.192] (ip3192.saw.rwth-aachen.de [137.226.183.192]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: db220660-p0g-1@packages.nexxes.net) by mx01.nexxes.net (Postfix) with ESMTPSA id A243C482451; Thu, 30 Apr 2015 16:35:43 +0200 (CEST) Message-ID: <55423DBF.3050202@birkholz.biz> Date: Thu, 30 Apr 2015 16:35:43 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0 MIME-Version: 1.0 To: Yasuo Ohgaki , Stanislav Malyshev CC: "internals@lists.php.net" References: <55401F31.9030703@gmail.com> <55416849.9010808@gmail.com> <5541753D.5050908@gmail.com> <55419C0C.7020207@gmail.com> In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] Adding "numeric" type hint From: dennis@birkholz.biz (Dennis Birkholz) Hi Yasuo, Am 30.04.2015 um 07:26 schrieb Yasuo Ohgaki: > "int" Cast is bad. Incorrect "int" type hint worse as it could trigger DoS. could you please stop arguing with "Denial of Service" for this behavior? Using a security related term that has nothing to do with the actual problem is irritating. Using a 32bit machine and producing an overflow which gracefully aborts your program (by a fatal error or an exception) is no security issue. It is just a programming error. Thanks Dennis