Peter Brodersen wrote:
Well, safe_mode could prevent someone of doing a
shell_exec("cat /home/otheruser/web/config.php");
open_basedir can't do the same thing.
We were in a continual losing race against that sort of thing though.
In pretty much every single release there have been ways to do this that
got around safe-mode.
- open_basedir restriction plus disable
exec+passthru+proc_open+shell_exec+system+popen+pcntl_exec(+dl)?
- jail users into hell?
- or something third?
I have always maintained that shared hosts should be running
per-security context Apache instances as different users. That's the
only way to truly keep things secure. If you have everyone executing
things as the same user id you will never truly separate the security
contexts. Failing that, shared hosts should be looking at per-user fastcgi.
-Rasmus
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php