On Mon, 23 Aug 2004, Adam Q wrote:

> > Hrm, well, it's a very bad idea to put the database anywhere under the
> > document root, because then you'd obviously be serving it for everyone
> > to download.  Encryption or no encryption, that's a very bad idea.
> > Instead, you should place the database file outside of the document
> > root (e.g. /usr/local/sqlite).  Make sure that this directory is
> > properly writable by the web server process and PHP, and you're done.
>
> Putting the files outside the document root is secure, I agree... But
> how can you be sure of this with an open source application (as opposed
> to internally developed)? People are likely to drop your application
> anywhere in their web tree they think it fits.
>
> >> And I'm thinking specifically of shared hosting situations (where PHP
> >> is used a great deal) where you are unable to change the hosting
> >> configuration.
> >
> > These setups typically run with setuid and/or chroot solutions, which
> > allow you (or the hosting provider) to solve that issue.
>
> How can I ask people to contact their hosting provider for a special
> setup before using my application?

All shared hosts that I saw already provide you with such space. THey
give you /home/your_site_name and in there www/ which is the webroot.
YOu can do whatever you want in /home/your_site_name

> I would like to distribute a tarball for a PHP application that can be
> dropped into someones website along the same lines as PostNuke,
> phpMyAdmin etc (you get the idea).

Perhaps this is exactly why PostNuke is considered insecure?

Derick

-- 
Derick Rethans
http://derickrethans.nl | http://ez.no | http://xdebug.org

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to