On Tue, 2007-10-09 at 14:11 -0400, Andrew Ballard wrote:
> On 10/9/07, Robert Cummings <[EMAIL PROTECTED]> wrote:
> > Certainly you'll notice I've extended the original class,
> > overriden the __wakeup() call and basically used inheritance
> > and polymorphism to my advantage.
> 
> Noticed. :-) I said a *little* more difficult. Of course, I could
> declare the class final, but then that ends any chance at inheritance.
> 
> > I would argue that this kind of tampering isn't worth checking for on
> > every unserialize.
> 
> I haven't done much with PHP objects (other than built-in objects),
> and can't recall a case where I've used serialize/unserialize for
> anything other than to inspect variables before functions like
> var_dump during development. In that case, your example concerns me
> more with what other developers might try to do to circumvent
> protections built into an object. It's a good argument for not storing
> objects in anything persistent, like session variables, though, since
> those are serialized/unserialized on every page and often stored in
> the physical file system.
> 
> Honestly, it all seems a bit extreme. At some point, you have to trust
> the people you work with not to go to such lengths to violate an
> objects contract -- which I guess goes back to Tony's point whether
> the language "enforces" private members/functions or whether they are
> simply regarded that way by the developers using them. I would prefer
> both, honestly. :)

If you're really worried about tampering of serialized data, store the
SHA1 code for the serialized data and validate before unserializing.

Cheers,
Rob.
-- 
...........................................................
SwarmBuy.com - http://www.swarmbuy.com

    Leveraging the buying power of the masses!
...........................................................

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to