I very much agree : )

-Jason

On Mon, 2002-05-13 at 03:42, veins wrote:
> > He has a point in the sense that it's trivially easy to starve a PHP based
> > web server from within, safe mode enabled or not.  What you describe as
> the
> > automated way in which the web server will overcome this attack is not
> > realistic - pretty quickly, the web server would hit the maximum number of
> > children allowed, or (if improperly configured) run out of memory.
> 
> This is not PHP related. A web server improperly configured would run out
> of memory under a heavy load or with a CGI script.
> 
> > Fact is, safe mode doesn't even attempt to guard against this.  Not that I
> > think it can be guarded against, even if we were trying to do it.  And a
> > direct derived fact is that PHP is not safe to allow untrusted users to
> run
> > code.
> 
> I happen to think that allowing untrusted users to run PHP code is safer
> than
> allowing them to run a CGI script, even if PHP is not under safe_mode and
> that CGI is chroot()-ed.
> 
> > I personally don't think that this was the idea behind safe mode - the
> idea
> > behind safe mode was to guard against information leaking in between
> users,
> > not against some renegade user that wants to bring the web server
> > down.  And, I've been advocating the removal of safe mode for years,
> > because even at that, it does a pretty bad job.  Not because it's poorly
> > implemented, but because it's protection in the wrong level, that by
> > definition, is bound to fail.  And, I think we all agree that a false
> sense
> > of security is worse than no security at all.
> 
> I don't. I don't see safe_mode as a "false sense" of security, I see it as
> another
> layer to be used with other security mechanisms. I would surely not run a
> web
> server with safe_mode being the only security, but I would not even run PHP
> without the safe_mode option. And many admins wouldn't...
> 
> > Ilya illustrated what I was saying a while ago, about the inherent (woo,
> > this word again! :) vulnerability of safe mode, by design.  When I said
> it,
> > I didn't invest any resources into proving that this inherent
> vulnerability
> > is actually exploitable, he did.  I believe that encouraging people to use
> > CGI (and fast CGI as a performance solution) is probably the only way to
> > go.  And I agree with Stig that PHP 5.0 would be the right point in time
> to
> > do that.
> 
> Encouraging people to use CGI is an utopia, there are environnements where
> CGI cannot be "offered" to customers and where PHP is the only option. The
> ability to use safe_mode (again, as another layer and not as the only
> security)
> is a nice option, I really strongly believe that it shouldn't be taken apart
> from
> PHP.
> 
> veins
> 



-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to