I think this is fine.

 - Stig

On Tue, 2002-04-16 at 19:06, Wez Furlong wrote:
> There is currently (and probably has been for quite a few releases) a
> crash bug where allow_url_fopen can not be set on a per-virtual host basis.
> That's because wrappers are only initialized on module init if
> PG(allow_url_fopen) is set, rather than request init.
> 
> I plan to change it so that wrappers are *always* initialized.
> 
> So that the allow_url_fopen setting is respected, I'm adding an is_url
> field to the wrapper structure.  If a wrapper has this field set and
> PG(allow_url_fopen) is not set, the streams system will display a warning
> stating that URLs are not allowed.
> 
> Now, the question is: was the original intention of the allow_url_fopen
> setting to prevent people from running scripts that contact the network?
> If so, it would be OK to have the zlib, bzip2 and user-space wrappers
> classed as not being a url for the purposes of this security/policy check?
> 
> Heres a chart summarizing the new behaviour:
> 
> wrapper    allow_url_fopen=on    allow_url_fopen=off
> ====================================================
> http       allowed               disallowed
> ftp        allowed               disallowed
> bzip2      allowed               allowed
> zlib       allowed               allowed
> user       allowed               allowed
> 
> user-space streams could potentially access the network using
> fsockopen etc., but I don't think this is an issue because the
> admin can then disable the use of that function as well.
> 
> Are there any reasons against this?
> 
> --Wez.
> 
> -- 
> Wez Furlong
> The Brain Room Ltd.
> 
> 
> -- 
> PHP Development Mailing List <http://www.php.net/>
> To unsubscribe, visit: http://www.php.net/unsub.php


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to