Russell Nelson wrote:

>Derick Rethans writes:
> > On Wed, 29 Jun 2005, Sara Golemon wrote:
>
> > > Only intrinsicly safe if you've read the manual page to know that
> > > badstring should have been null terminated.
>
>Oh, don't get me started on C's null-terminated strings!
>
> > Stop feeding the troll please.
>
>Public requests to stop feeding a troll ARE troll food.  The only way
>to stop a troll is to reply privately to people who respond to him.
>
>Besides which, I'm not trolling for flames.  I'm politely requesting
>that you fix a well-known problem in PHP.
>
>  
>
It seems that you don't understand that the programmers have a bit of
responsability. We can't avoid users adding security holes in their
scripts, this is not the role of the programming language, all we can do
is informing them that this is not good. Just because include/require
are often used badly, that's not a reason to disable that function from
including remote files.

XSS is a common security hole too, and there is no point disallowing
echo and print from printing user's data.

PHP have already been too far this way, magic_quotes_gpc is a good
example: magic_quotes_gpc just hides a security hole, and newbies are
lost when a problem occurs, they have never heard about problems with
quotes in the data used in queries.

regards

-- 
Etienne Kneuss

http://www.colder.ch/
[EMAIL PROTECTED]

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to