If you think there are a lot of people who want this feature as you propose
it, then I won't oppose such implementation. I guess the only thing I
wouldn't be able to live with would be a default setting after a fresh PHP
install where there is a non-raw filter in place. Beyond that, if there are
a whole lot of people who would like to see this feature (you are obviously
experienced with situations where such a default filter setting would come
in very handy, so I have no doubt there are more people who agree) then I
can't oppose it.

But please, don't make the magic_quotes_gpc mistake of having it behave
non-raw by default in a fresh php.ini. Please, let the default be "raw"
(with of course the possibility for people to change it).

Ron

"Rasmus Lerdorf" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]
> Ron Korving wrote:
> > It's a very weird idea to me to filter out HTML on input, because the
only
> > place where HTML tags could be abused is in the output. So that's where
> > filtering should take place, imho. Maybe it's hard to figure out a way
to do
> > this the easiest way, but failing to come up with an output filtering
idea
> > should not result in input filtering "just because it's easier" (which,
I'm
> > very sorry to say reminds me once again of magic_quotes_gpc... it's much
> > easier to define such a rule globally, but you end up with a lot of
crap).
>
> Once again, I am open to other solutions to the problem as stated.  I
> don't see how an output filter could ever work.  You can't exactly
> filter out raw html at the output stage since just about every PHP
> application ever written spits out HTML.  People keep wanting a taint
> mode in PHP where user data can't be used for anything until validated
> and thus untainted.  That would break far more things than this
> implementation since every single application would have to be modified
> for taint support whereas this approach only requires changes to the
> specific places in an application where raw data is required.
>
> And by the way, the security policy may include other things that aren't
> limited to output vulnerabilities like XSS.  I might for example never
> want null characters coming into my system unless it is a file upload.
> I am pretty sure weeding out nulls isn't going to break your code in any
> way while at the same time it may very well plug security problems in a
> number of places.
>
> How about if I state it this way.  As an application developer you are
> not expected to work around local security policies.  Checking for and
> using the supplied filtering functions would be a good idea since they
> are likely faster and more robust than the userspace equivalents.  Given
> that the hook has been available and documented for 2 years you can't
> possibly know what sort of filters are in place today and I can assure
> you that your code is unlikely to work in my environment.  Having a
> standard set of filtering functions available that work in conjunction
> with the input filtering hook at least gives you a way to have a chance
> at working in my environment.
>
> -Rasmus

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to