|
BugTraq
new linux malware Feb 18 2006 10:40PM Gadi Evron (ge linuxbox org) (2 replies) Re: new linux malware Feb 20 2006 04:57PM Christine Kronberg (Christine_Kronberg genua de) (1 replies) PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 20 2006 08:22PM Gadi Evron (ge linuxbox org) (2 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Dec 30 2006 10:00PM Kevin Waterson (kevin oceania net) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Jan 01 2007 05:53PM Bill Nash (billn billn net) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Jan 01 2007 09:00PM Tino Wildenhain (tino wildenhain de) (1 replies) RE: PHP as a secure language? PHP worms? [was: Re: new linux malware] Jan 01 2007 09:31PM Jim Harrison (Jim isatools org) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Jan 01 2007 10:37PM Dana Hudes (dhudes hudes org) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 22 2006 10:48AM Kevin Waterson (kevin oceania net) (2 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 24 2006 09:13PM Matthew Schiros (schiros gmail com) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 27 2006 03:26PM L. Adrian Griffis (agriffis dstsystems com) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 27 2006 03:50PM Matthew Schiros (schiros gmail com) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 27 2006 04:21PM L. Adrian Griffis (agriffis dstsystems com) (1 replies) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 27 2006 05:55PM Matthew Schiros (schiros gmail com) Re: PHP as a secure language? PHP worms? [was: Re: new linux malware] Feb 24 2006 09:07PM Jamie Riden (jamie riden gmail com) Re: new linux malware Feb 20 2006 04:24PM Marco Monicelli (marco monicelli marcegaglia com) (1 replies) |
|
Privacy Statement |
This argument proves my point that there is no such thing as a truly
"secure" language; it's entirely dependent on the dev skills.
-----Original Message-----
From: Dana Hudes [mailto:dhudes (at) hudes (dot) org [email concealed]]
Sent: Monday, January 01, 2007 2:37 PM
To: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: Re: PHP as a secure language? PHP worms? [was: Re: new linux
malware]
While I agree that it is poor coding habits on the part of many
developers that are responsible for most PHP application security flaws,
nonetheless there are features in PHP4 which encourage these habits by
choosing insecure defaults. "Magic quotes" was one example.
One of the powerful aspects of PHP, and of Perl, is the string-oriented
"typeless" approach where things magically become the appropriate type
(as compared to e.g. C, where you can blithely stuff an integer value
into a float and thereby corrupt the value if not cause a crash of the
runtime library when you feed this garbage to it -- no type conversion.
Strict typing requiring explicit conversion (with validation) improves
security by eliminating certain types of vulnerability. Java held some
promise in this regard but the associated libraries have many bugs
(e.g. one I just hit in JDK 1.507 for http proxy. a bug that wasn't
there in 1.4.2). Of course, the large number of available library code
is part of the attraction of Perl, Java and PHP; ML, for example, while
I have seen CGI code written in it lacks the broad developer community
(there is one, its just small compared to the more popular languages).
Jim Harrison wrote:
> <Peeve type="pet">
> "They" (developers) and "it" (the secure language) are both moving
> targets.
> There is no "genetic memory" with the human race; any more than there
> is an "inherently secure" language. For every developer that learns
> how to write "secure code", at least one more starts cutting his/her
> teeth in the same language; possibly for the same reasons. Anyone who
> insists that there either exists a "secure language" or that the
> problem of "secure code" can be "completely solved" is IMHO, severely
deluded.
> Neither will ever be even remotely true.
> </Peeve type="pet">
>
> If you have issue with someone's code habits, address it with them
> first. This is part & parcel to the "education" process. If this
> fails because of their unwillingness or inability to adjust, then
> you've done what you can. If this unresolved problem presents a
> public disservice, then you report it. Public opinion is a powerful
motivator.
>
> Jim
>
>
> -----Original Message-----
> From: Tino Wildenhain [mailto:tino (at) wildenhain (dot) de [email concealed]]
> Sent: Monday, January 01, 2007 1:00 PM
> To: Bill Nash
> Cc: Kevin Waterson; bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Re: PHP as a secure language? PHP worms? [was: Re: new linux
> malware]
>
> Bill Nash schrieb:
> ...
>
>> *ANY* language implemented for *ANY* purpose is as secure as the
>>
>
>
>> programmer makes it. The way the original post is written,
>> s/PHP/(Perl|ASP|C|bash|BASIC|four little buddhist monks fighting over
>> an abacus)/ is applicable. The vulnerabilities that we see, that Gadi
>> refers to, aren't widespread because PHP is widespread, but because
>> insecure applications written in PHP are. A better use of energy
>> would
>>
>
>
>> be focusing on the most vulnerable platforms and educating the
>>
> developers.
>
> But aparently they aren't educatable - hence they stick to this
> language. (Because of the many bad examples they can cut&paste code
> from)
>
> T.
>
> All mail to and from this domain is GFI-scanned.
>
>
All mail to and from this domain is GFI-scanned.
[ reply ]