Andi,
> Stefan, do you truly believe that other languages allow for secure shared 
> hosting without using a setuid or chroot solution? I mean
> take Ruby, Python, Java, C/C++. Can you point out one of them which would not 
> have the issues that PHP has? I think the problem in
>   
How it the fitness of other languages relevant for the security holes in
PHP. What have other languages todo with the POOR quality of PHP's C
source code? Unlike other languages PHP claims to have functions like
disable_functions / open_basedir / safe_mode. They are however worth
NOTHING, because there are so many local vulnerabilities in PHP that
every attacker can just choose one and execute any code he wants anyway.
> Do we need to provide better tools for our developers? Definitely! This is 
> why we are working on ext/filter (I agree the first pass
> wasn't very successful), a filter extension in Zend Framework, and other best 
> practices.
>   
Stop blaming PHP users. Of course a lot of them are not skilled and do
error. This is however completely unrelated to the POOR quality of PHP's
C source code.
> We have also made significant progress on the core PHP security issues 
> including a coverity code scan (and we are planning to use an
> additional company), removing flawed features such as register_globals and 
> safe_mode (the latter was never encouraged but I can't
>   
You cannot achieve security with tools. Coverity has obviously not found
a single of the vulnerabilities I disclosed. They are worthless. You
cannot improve security with tools.

> blame people for falling into the trap with the crappy name), and many other 
> things. We also have had IBM Research look into various
> aspects of PHP one of these efforts led to Wietse Venema's suggestion for 
> tainting (which is the main reason why Stefan left the
> security team as he took that personally because a few years ago he brought 
> up the idea and we weren't in favor).
>   
Andi your propaganda is getting old. First of all I never brought up the
taint mode idea. I simply started an implementation for HPHP and told
[EMAIL PROTECTED] that I think I should continue to work on it before you
have yours ready. The fact that someone brought it up in the past is
completely unrelated to me. The fact that I was immediately attacked by
Zend after telling [EMAIL PROTECTED] about this plan was just one more drop.

I left the PHP Security Response Team, because you do not listen,
because you think you know everything better, because you believe the
PHP community is full of security heroes. I had enough of this. I
strongly disagree and I see no reason to be part of a "security team"
that has actually no clue. And I also had enough from the countless
attacks from other PHP developers that want me dead, call me immoral
traitor, ...

> Stefan has a personal vandetta against the PHP Group because we had asked him 
> not to use the PHP brand in the Hardened-PHP patch.
>   
Vendetta yourself. Unlike your silly accusations my vulnerability
reports are based on facts.
> PHP license does not allow it. We can not enforce that with projects which 
> are not directly derived from PHP's source code like PHP
> applications and groups, but Stefan considers we are still following a double 
> standard which we aren't.
>   
You are following a double standard. A project that steals CSS source
code from the PHP source and uses it in a PHP application to mimic the
phpinfo() look has stolen code licensed under the PHP license. It cannot
have the name PHP in it's name. But we all know that Shiflett is your
close friend... Nothing more has to be said.
> I hope at some point Stefan is going to channel his knowledge in a more 
> positive way.
>   
Andi grow up. Who do you want to trick with these closing words? A lot
of people know WHO improved the security of PHP during the last years.
If that is not a positive thing I really don't know.


Stefan Esser

-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to