Hi Stas,

On Thu, Feb 26, 2015 at 8:26 AM, Stanislav Malyshev <smalys...@gmail.com>
wrote:

> Padraic, I'm not really interested in another prolonged discussion,
> especially where my arguments are ignored or misconstrued and then
> dismissed. I have explained my opinion, if somebody has questions about
> the substance of my arguments or need me to clarify my points, rather
> than flat-out denial of what I am saying, they know where to find me. I
> think this RFC is bad. You think it's excellent. I tried to explain my
> point to you, judging by your responses, I failed to convey my meaning.
> I am probably bad at this, but I'm not going to become better by
> repeating the same over and over.
>

I'm not ignoring your discussion at all. That's why I was proposed context
based protection before. It turned out context based detection does not
work well at all with your discussion. So I switched back to original idea
which detects filename extension.

As I stated in the RFC, we have/had so many script/file inclusion
vulnerabilities
in past. F-Secure which is one of antivirus vendor reports image based PHP
script malware is increasing! We can easily find WordPress users who were
installed WebShell by attackers, for example.

What I'm proposing is to introduce effective mitigation (defense in depth)
against
_fatal_ security breach. Your discussion for this RFC does not negate the
protection proposed. IMHO.

If you don't like or don't need the protection, you can easily disable it
while
the protection can protect many programs/users against fatal security
breach.
(I'm not saying the proposal can prevent all kinds of codes/attacks)

I don't think attackers can circumvent the default configuration. If it
can,
please let me know. Please keep in mind that we are discussing for
include/require security.

I hope you realize the benefits of this proposal.

Regards,

--
Yasuo Ohgaki
yohg...@ohgaki.net

Reply via email to