Well, as long as there is exec(2), there is a way.  How many users do
Lycos Europe provide sandboxed PHP for?

 - Stig

On Sun, 2002-05-12 at 23:37, Rasmus Lerdorf wrote:
> But for really large shared hosts, I don't think that is feasible.  How
> are you going set up 100,000 prisons on a server?
> 
> > I'm +1 on removing safe mode in PHP 5, and encourage the use of
> > system-level sandboxes/prisons instead.
> >
> >  - Stig
> >
> > On Sat, 2002-05-11 at 17:39, Ilia A. wrote:
> > > In the process of writing an installer in PHP for one of my projects I've come
> > > in contact with a number of servers running PHP with safe_mode enabled.
> > >
> > > As you can probably imagine the installer at first broke completely because of
> > > safe_mode restrictions. Despite the restriction I was able to write php code
> > > that was able to bypass safe_mode restriction in every single case, which
> > > should tell you just how "safe" that option is.
> > >
> > > There are numerous ways to bypass it, rely on file system utils if they are in
> > > the path, make the script copy itself and then write stuff as webserver,
> > > install a small script into cgi-bin directory that will do the same thing
> > > etc...
> > > The number of ways to bypass this feature are too numerous to list here.
> > >
> > > I should also point out that safe_mode implementation has numerous bugs in
> > > every PHP version including the very latest CVS.
> > >
> > > It is my belief that safe_mode gives people who use false sense of security by
> > > "supposedly" securing their webserver from their own users, which is
> > > pointless since a "dedicated user" can cause plenty of damage by using
> > > while(1) include $PHP_SELF; etc...
> > > In addition safe_mode makes the developer life extremely difficult since it
> > > blocks the most common operations that ARE ALLOWED by the webserver's file
> > > permissions, why does PHP take on the role that is not done in any other
> > > programming language?
> > > It is nearly impossible to write a PHP file system code that would work with
> > > safe_mode it is much easier to just release C/Perl/Python etc.. code that
> > > will do the very same thing and run via a command line or the user's cgi-bin
> > > directory.
> > > For example, if a user uploads test.php with their FTP and test.php creates a
> > > file, it will no longer be able to read that file under safe_mode since the
> > > uid of the script and the file it created differ.
> > >
> > > IMHO safe_mode should be removed from the php core, because it lulls web
> > > server admins into false sense of security thus not taking the time to setup
> > > proper file system permissions in addition to severely crippling the PHP's
> > > file system functionality.
> > >
> > > If the safe_mode like functionality remains it should simply block all file
> > > system and shell execution code since with it most of that code becomes
> > > useless anyway.
> > >
> > > Regards,
> > >
> > > Ilia
> > >
> > > --
> > > PHP Development Mailing List <http://www.php.net/>
> > > To unsubscribe, visit: http://www.php.net/unsub.php
> >
> >
> > --
> > PHP Development Mailing List <http://www.php.net/>
> > To unsubscribe, visit: http://www.php.net/unsub.php
> >


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to