Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:94777 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 35828 invoked from network); 1 Aug 2016 12:25:19 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 1 Aug 2016 12:25:19 -0000 Authentication-Results: pb1.pair.com smtp.mail=cmbecker69@gmx.de; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=cmbecker69@gmx.de; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmx.de designates 212.227.15.18 as permitted sender) X-PHP-List-Original-Sender: cmbecker69@gmx.de X-Host-Fingerprint: 212.227.15.18 mout.gmx.net Received: from [212.227.15.18] ([212.227.15.18:55436] helo=mout.gmx.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id DE/50-32001-CAF3F975 for ; Mon, 01 Aug 2016 08:25:17 -0400 Received: from [192.168.2.103] ([217.82.227.154]) by mail.gmx.com (mrgmx001) with ESMTPSA (Nemesis) id 0LqhmM-1aqAR81k7m-00eM6B; Mon, 01 Aug 2016 14:25:12 +0200 To: Michael Vostrikov , PHP Internals References: Message-ID: <905a2505-fc4d-0c54-9d6e-73b69d96d259@gmx.de> Date: Mon, 1 Aug 2016 14:25:36 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K0:0r9Qo8R9debvOh4DrYpoKTnH+lZ7HV78WM2jHTPaAU0DgVLnnbg XsjoQkkXBP1o5UOqTYTnEMOQYexcX+hkL33ozA5yezrxhFio1RMYKh7nemUuAzyFKRiHg0z zojzHymmGZBoq3AZfJufQuQwnD2YgrL08Q9v+4wZsc2DyZ3uJaUkR4ekMBR9cgH3XuuUkXz LDzKMgoCX6PRFgCyuXs9w== X-UI-Out-Filterresults: notjunk:1;V01:K0:E23TjqDsvgE=:iBNeemCv7s7KvtoSoRiaVW YCLGdPe5g8/+asODuamlLA6yBhA+0WpMxTDJYqPjMu+59Nr+saloR5/vUy9rd0PZl4UHts09M La+A0PuhRDwiWAsuxWHtkhWG4gw7no14RK55r7rmFhl69vt7JBKtchKTDa5j/p+9bw1/ehytG WF5Ob7uMxPz+yXiJcZDcFDIv9JaUC+z3rRy3bcBG5km/ufEsS00blHRHvE0LGZdczylMmuqgD d8VIdEXM8wIZBHCUx/3TkcJCKVaxTfe65qtIGCwOx+oPJKxlHsbuJDvH8bYGpba0FYUS1g7CE /kkwnp0CBIwQbMKbZNf9OWgnrtG1B/Brfa0kF2z1GzDah/wXBbAnpf9SoW6BgdzfRjJjvVnRn NlCP5IUNR+2NKcKk8Yor7MrR5ZykydhHJcZRezaH3hEEJQn0uCA+xsamWKduUm7uasqTEZ6Ep O+jTE2zel1LmlH6MNkfXG0/N1ZJWL1sOjE5fr8j4kI1LihlSOoappBWvjDfREHpn67kVgKdji VBhDMcVq1aqp7Crh66VU1tIPiJ3QHPX6+/ZnREKgjJJNaC8RnqfwLZFhMad10vbUSF14kvAO4 DhXp6UHs9HnQrgKjSuuepmdkUmhgURiZ8eZ/RS+twc8YumTbameLwFoFipO1+MwSUFDnoDwHm qfi2SH40abH5aS/yCiijuMDagI9+vEG6FRbZDCdvyGYHEcTewFWKoEYuQjjpOtKFF2FXi0rIn evuVcsXVceA9npd20msCw6aWqNGhMKHF2JRQ+i8IJiTqMfRIpio8y+ho8ME7PwiCHaE8slsE1 nAPV/Vo Subject: Re: [RFC][VOTE] New operator (short tag) for context-dependent escaping From: cmbecker69@gmx.de (Christoph Becker) On 30.07.2016 at 17:09, Michael Vostrikov wrote: > Hello. The RFC 'New operator (short tag) for context-dependent escaping' is > now in voting phase. > > https://wiki.php.net/rfc/escaping_operator I just checked out the cde_new branch to verify the behavior of some potential edge cases, but after building I've got segfaults even for sapi/cli/php -n -r "" That's not a problem per se, as the RFC process doesn't even require an implementation before voting. :-) Being able to play around with an implementation would be unlikely to change my vote anyway. My *main* issue with this RFC is that I don't consider it to enhance security. Forgetting to call the proper escaping function is as easy as forgetting to use