goba Sun Aug 8 12:11:36 2004 EDT
Removed files:
/phpdoc/en/security index.xml
Modified files:
/phpdoc manual.xml.in
/phpdoc/en/security apache.xml cgi-bin.xml current.xml database.xml
errors.xml filesystem.xml general.xml
globals.xml hiding.xml intro.xml variables.xml
Log:
Solved the 'security in security' TOC problem
by elevating the containers one level up.
Yes, I know this breaks all translations with
a translated security section and I am working
on solving their problems
http://cvs.php.net/diff.php/phpdoc/manual.xml.in?r1=1.183&r2=1.184&ty=u
Index: phpdoc/manual.xml.in
diff -u phpdoc/manual.xml.in:1.183 phpdoc/manual.xml.in:1.184
--- phpdoc/manual.xml.in:1.183 Fri Aug 6 18:37:44 2004
+++ phpdoc/manual.xml.in Sun Aug 8 12:11:36 2004
@@ -2,7 +2,7 @@
<!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"
"@srcdir@/dtds/dbxml-4.1.2/docbookx.dtd" [
-<!-- $Revision: 1.183 $ -->
+<!-- $Revision: 1.184 $ -->
<!-- Add translated specific definitions and snippets -->
<!ENTITY % language-defs SYSTEM "@srcdir@/@LANGDIR@/language-defs.ent">
@@ -84,7 +84,17 @@
<part id="security">
<title>&Security;</title>
- &security.index;
+ &security.intro;
+ &security.general;
+ &security.cgi-bin;
+ &security.apache;
+ &security.filesystem;
+ &security.database;
+ &security.errors;
+ &security.globals;
+ &security.variables;
+ &security.hiding;
+ &security.current;
</part>
<part id="features">
http://cvs.php.net/diff.php/phpdoc/en/security/apache.xml?r1=1.1&r2=1.2&ty=u
Index: phpdoc/en/security/apache.xml
diff -u phpdoc/en/security/apache.xml:1.1 phpdoc/en/security/apache.xml:1.2
--- phpdoc/en/security/apache.xml:1.1 Mon Jan 26 08:22:25 2004
+++ phpdoc/en/security/apache.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.1 $ -->
+<!-- $Revision: 1.2 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.apache">
+ <chapter id="security.apache">
<title>Installed as an Apache module</title>
<simpara>
When PHP is used as an Apache module it inherits Apache's user
@@ -43,7 +43,7 @@
apache-only areas, to restrict all web based activity to non-user,
or non-system, files.
</simpara>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/cgi-bin.xml?r1=1.3&r2=1.4&ty=u
Index: phpdoc/en/security/cgi-bin.xml
diff -u phpdoc/en/security/cgi-bin.xml:1.3 phpdoc/en/security/cgi-bin.xml:1.4
--- phpdoc/en/security/cgi-bin.xml:1.3 Tue Jun 1 15:50:45 2004
+++ phpdoc/en/security/cgi-bin.xml Sun Aug 8 12:11:36 2004
@@ -1,10 +1,10 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.3 $ -->
+<!-- $Revision: 1.4 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.cgi-bin">
+ <chapter id="security.cgi-bin">
<title>Installed as CGI binary</title>
- <sect2 id="security.cgi-bin.attacks">
+ <sect1 id="security.cgi-bin.attacks">
<title>Possible attacks</title>
<simpara>
Using PHP as a <acronym>CGI</acronym> binary is an option for
@@ -74,9 +74,9 @@
</simpara>
</listitem>
</itemizedlist>
- </sect2>
+ </sect1>
- <sect2 id="security.cgi-bin.default">
+ <sect1 id="security.cgi-bin.default">
<title>Case 1: only public files served</title>
<simpara>
@@ -98,9 +98,9 @@
Redirection can be configured in Apache by using AddHandler and
Action directives (see below).
</simpara>
- </sect2>
+ </sect1>
- <sect2 id="security.cgi-bin.force-redirect">
+ <sect1 id="security.cgi-bin.force-redirect">
<title>Case 2: using --enable-force-cgi-redirect</title>
<simpara>
This compile-time option prevents anyone from calling PHP
@@ -128,9 +128,9 @@
one of the other ways of running the CGI version documented
here.
</simpara>
- </sect2>
+ </sect1>
- <sect2 id="security.cgi-bin.doc-root">
+ <sect1 id="security.cgi-bin.doc-root">
<title>Case 3: setting doc_root or user_dir</title>
<simpara>
To include active content, like scripts and executables, in the
@@ -188,9 +188,9 @@
the document root and user directory access
separately.
</simpara>
- </sect2>
+ </sect1>
- <sect2 id="security.cgi-bin.shell">
+ <sect1 id="security.cgi-bin.shell">
<title>Case 4: PHP parser outside of web tree</title>
<para>
A very secure option is to put the PHP parser binary somewhere
@@ -219,9 +219,9 @@
linkend="configure.enable-discard-path">--enable-discard-path</link>
configure option.
</para>
- </sect2>
+ </sect1>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/current.xml?r1=1.1&r2=1.2&ty=u
Index: phpdoc/en/security/current.xml
diff -u phpdoc/en/security/current.xml:1.1 phpdoc/en/security/current.xml:1.2
--- phpdoc/en/security/current.xml:1.1 Mon Jan 26 08:22:25 2004
+++ phpdoc/en/security/current.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.1 $ -->
+<!-- $Revision: 1.2 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.current">
+ <chapter id="security.current">
<title>Keeping Current</title>
<simpara>
PHP, like any other large system, is under constant scrutiny and
@@ -15,7 +15,7 @@
approach is to update often, and maintain awareness of the latest
versions and their changes.
</simpara>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
http://cvs.php.net/diff.php/phpdoc/en/security/database.xml?r1=1.4&r2=1.5&ty=u
Index: phpdoc/en/security/database.xml
diff -u phpdoc/en/security/database.xml:1.4 phpdoc/en/security/database.xml:1.5
--- phpdoc/en/security/database.xml:1.4 Sun Apr 11 11:42:00 2004
+++ phpdoc/en/security/database.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.4 $ -->
+<!-- $Revision: 1.5 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.database">
+ <chapter id="security.database">
<title>Database Security</title>
<simpara>
@@ -30,7 +30,7 @@
deals with your greatest fears.
</simpara>
- <sect2 id="security.database.design">
+ <sect1 id="security.database.design">
<title>Designing Databases</title>
<simpara>
The first step is always to create the database, unless you want to use
@@ -64,9 +64,9 @@
insight when debugging problems with your application or tracing back
transactions.
</simpara>
- </sect2>
+ </sect1>
- <sect2 id="security.database.connection">
+ <sect1 id="security.database.connection">
<title>Connecting to Database</title>
<simpara>
You may want to estabilish the connections over SSL to encrypt
@@ -80,9 +80,9 @@
linkend="ref.openssl">OpenSSL functions</link> in communication between
PHP and database via SSL.
</simpara-->
- </sect2>
+ </sect1>
- <sect2 id="security.database.storage">
+ <sect1 id="security.database.storage">
<title>Encrypted Storage Model</title>
<simpara>
SSL/SSH protects data travelling from the client to the server, SSL/SSH
@@ -140,9 +140,9 @@
]]>
</programlisting>
</example>
- </sect2>
+ </sect1>
- <sect2 id="security.database.sql-injection">
+ <sect1 id="security.database.sql-injection">
<title>SQL Injection</title>
<simpara>
Many web developers are unaware of how SQL queries can be tampered with,
@@ -347,7 +347,7 @@
</para>
</note>
- <sect3 id="security.database.avoiding">
+ <sect2 id="security.database.avoiding">
<title>Avoiding techniques</title>
<simpara>
You may plead that the attacker must possess a piece of information
@@ -444,9 +444,9 @@
application has been circumvented. The log is not useful by itself, but
through the information it contains. More detail is generally better than less.
</simpara>
- </sect3>
- </sect2>
- </sect1>
+ </sect2>
+ </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/errors.xml?r1=1.4&r2=1.5&ty=u
Index: phpdoc/en/security/errors.xml
diff -u phpdoc/en/security/errors.xml:1.4 phpdoc/en/security/errors.xml:1.5
--- phpdoc/en/security/errors.xml:1.4 Thu Mar 18 10:40:04 2004
+++ phpdoc/en/security/errors.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.4 $ -->
+<!-- $Revision: 1.5 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.errors">
+ <chapter id="security.errors">
<title>Error Reporting</title>
<para>
With PHP security, there are two sides to error reporting. One is
@@ -117,7 +117,7 @@
</programlisting>
</example>
</para>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/filesystem.xml?r1=1.2&r2=1.3&ty=u
Index: phpdoc/en/security/filesystem.xml
diff -u phpdoc/en/security/filesystem.xml:1.2 phpdoc/en/security/filesystem.xml:1.3
--- phpdoc/en/security/filesystem.xml:1.2 Thu Apr 1 01:31:15 2004
+++ phpdoc/en/security/filesystem.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.2 $ -->
+<!-- $Revision: 1.3 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.filesystem">
+ <chapter id="security.filesystem">
<title>Filesystem Security</title>
<simpara>
PHP is subject to the security built into most server systems with
@@ -133,7 +133,7 @@
reason, it's usually easier to create a policy where you forbid
everything except for what you explicitly allow.
</para>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/general.xml?r1=1.2&r2=1.3&ty=u
Index: phpdoc/en/security/general.xml
diff -u phpdoc/en/security/general.xml:1.2 phpdoc/en/security/general.xml:1.3
--- phpdoc/en/security/general.xml:1.2 Sun Apr 18 09:52:53 2004
+++ phpdoc/en/security/general.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.2 $ -->
+<!-- $Revision: 1.3 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.general">
+ <chapter id="security.general">
<title>General considerations</title>
<simpara>
A completely secure system is a virtual impossibility, so an
@@ -47,7 +47,7 @@
simply trawl massive IP blocks looking for victims. Try not to
become one.
</simpara>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/globals.xml?r1=1.2&r2=1.3&ty=u
Index: phpdoc/en/security/globals.xml
diff -u phpdoc/en/security/globals.xml:1.2 phpdoc/en/security/globals.xml:1.3
--- phpdoc/en/security/globals.xml:1.2 Sun Apr 11 11:42:00 2004
+++ phpdoc/en/security/globals.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.2 $ -->
+<!-- $Revision: 1.3 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.globals">
+ <chapter id="security.globals">
<title>Using Register Globals</title>
<para>
Perhaps the most controversial change in PHP is when the default value
@@ -136,7 +136,7 @@
¬e.superglobals;
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/hiding.xml?r1=1.1&r2=1.2&ty=u
Index: phpdoc/en/security/hiding.xml
diff -u phpdoc/en/security/hiding.xml:1.1 phpdoc/en/security/hiding.xml:1.2
--- phpdoc/en/security/hiding.xml:1.1 Mon Jan 26 08:22:25 2004
+++ phpdoc/en/security/hiding.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.1 $ -->
+<!-- $Revision: 1.2 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.hiding">
+ <chapter id="security.hiding">
<title>Hiding PHP</title>
<para>
In general, security by obscurity is one of the weakest forms of security.
@@ -52,7 +52,7 @@
the above extensions. While it is a form of security through
obscurity, it's a minor preventative measure with few drawbacks.
</para>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
http://cvs.php.net/diff.php/phpdoc/en/security/intro.xml?r1=1.3&r2=1.4&ty=u
Index: phpdoc/en/security/intro.xml
diff -u phpdoc/en/security/intro.xml:1.3 phpdoc/en/security/intro.xml:1.4
--- phpdoc/en/security/intro.xml:1.3 Wed Feb 18 11:05:29 2004
+++ phpdoc/en/security/intro.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.3 $ -->
+<!-- $Revision: 1.4 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.intro">
+ <chapter id="security.intro">
<title>Introduction</title>
<simpara>
PHP is a powerful language and the interpreter, whether included
@@ -37,7 +37,7 @@
they can be safely used, and describes different considerations in
coding for different levels of security.
</simpara>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables:
http://cvs.php.net/diff.php/phpdoc/en/security/variables.xml?r1=1.2&r2=1.3&ty=u
Index: phpdoc/en/security/variables.xml
diff -u phpdoc/en/security/variables.xml:1.2 phpdoc/en/security/variables.xml:1.3
--- phpdoc/en/security/variables.xml:1.2 Thu Apr 1 01:31:15 2004
+++ phpdoc/en/security/variables.xml Sun Aug 8 12:11:36 2004
@@ -1,7 +1,7 @@
<?xml version="1.0" encoding="iso-8859-1"?>
-<!-- $Revision: 1.2 $ -->
+<!-- $Revision: 1.3 $ -->
<!-- splitted from ./index.xml, last change in rev 1.66 -->
- <sect1 id="security.variables">
+ <chapter id="security.variables">
<title>User Submitted Data</title>
<para>
The greatest weakness in many PHP programs is not inherent in the
@@ -75,7 +75,7 @@
initialized (so you can prevent unusual data from being
operated upon).
</para>
- </sect1>
+ </chapter>
<!-- Keep this comment at the end of the file
Local variables: