On Thu, Aug 8, 2019 at 3:35 PM Zeev Suraski <z...@php.net> wrote:

> On Thu, Aug 8, 2019 at 9:10 PM Bishop Bettini <bis...@php.net> wrote:
>
>> On Tue, Aug 6, 2019 at 7:34 AM G. P. B. <george.bany...@gmail.com> wrote:
>>
>> > The voting for the "Deprecate short open tags, again" [1] RFC has begun.
>> > It is expected to last two (2) weeks until 2019-08-20.
>> >
>> > A counter argument to this RFC is available at
>> > https://wiki.php.net/rfc/counterargument/deprecate_php_short_tags
>> >
>
> If anyone needs to justify the effort, let them say "<? is a security
>> hole".
>>
>
> It's a security hole in the exact same level that httpd.conf is a security
> hole.  Yes, misconfiguring your Web server can have severe consequences.
> Thankfully, it's not nearly that big of a Thing for us to be concerned
> about.
>

No, not even close to the same level.

If my web server's misconfigured, (ALL) of my code's exposed. It's trivial
to write a test to prove that my web server is properly serving PHP files.

But if PHP's misconfigured, (all OR some OR none) of my code's exposed. The
only way to decide is to literally check everything. That's why I
highlighted Robert Korulczyk's case study: only a particular code path in a
particular environment had the problem.

The status quo enables deployments to fail insecurely. <? $dbpassword =
"secret"; is a trap waiting to spring. I would rather require ten thousand
people secure their environment by running a script, than risk a single
person exposing their credentials for all to steal.

I challenge everyone who's voted no to consider this balance.

Reply via email to