[ale] Seven Deadly Sins

Geoffrey esoteric at 3times25.net
Fri Jun 13 05:51:56 EDT 2003


Christopher Bergeron wrote:
> Transam wrote:
> 
>> Regarding PHP, I recommended against using it because the program itself
>> has had a recent history of lots of severe security vulnerabilities.
>> Thus, even if one uses it correctly, one's system is at significant
>> risk of compromise.  I am fond of saying that security is not convenient.
>> In this case, it means find another solution.  I put IIS in the same
>> category, but more so.
>>
> Too late.  The PHP genie is out of the bottle.  It's FAST, it's EASY, 
> and it's suprisingly powerful.  Not using it for web development because 
> it "has had a recent history of ... security vulnerabilities" is roughly 
> equivalent to asking people not to use apache, dns, or ssh (those 
> packages have also recently been found to have serious security 
> issues/bugs).  In fact, a more poignant arguement would be that we 
> shouldn't use C as a programming language because it suffers from 
> strcmp() (and many other) issues that don't check variables before 
> passing them blindly into memory.  The language itself shouldn't be the 
> target, the coded product should be.

There's a difference between using a language incorrectly and using a 
tool that has a known exploit.  Further, alot depends on the number of 
vulnerabilities, and ease with which they can be exploited.  As we all 
know ssh has had a vulnerability or two, but I'm sure we all still use 
it.  On the other hand, products that demonstrate a complete lack of 
security conscious, are ones I most definitely steer clear of (can we 
say Microsoft?)

> 
>> In the book I also give recommendations for secure programming techniques
>> that include having all code audited by someone knowledgeable in auditing
>> for security problems.  I also point out that many programmers who do
>> CGI programming, including PHP, are not knowledgeable in how to write
>> code that avoids security vulnerabilities.
>>
> I wholeheartedly agree with this point since my php programmer and I are 
> constantly duke'ing it out.  He want's to just get the code done, and I 
> always seem to end up as the bad guy whom is constantly throwing 
> "hurdles" in his way because I don't want to blindly accept (or trust) 
> input from users, cookies, or ANYTHING that I/we/our_code don't have 
> complete control over.

I would have a huge problem with a programmer who you have to constantly 
oversee because of these issues.  If he/she is not learning from you 
head banging sessions, then he/she should be looking for a job.  Maybe 
she/he is, but you didn't seem to indicate as such.

> However, as a fellow PHP coder (and net/sec 
> admin), I think that the only real pseudo-advantage that the PHP 
> alternatives have to offer is that they are obscure.  As we all know, 
> security _can't_ be obtained through obscurity.  cgi, perl, et al; have 
> not been adopted as thoroughly as PHP has (to date) for web programming;

What????  I don't have the stats, but if you do, I'd like to see them. 
Perl was around a long time before php showed up on the internet.  I 
find it hard to believe that php usage exceeds perl.

> However, as always, a good relationship between coders and 
> network/security guys is the winning combination.  Cutting corners on 
> either side is a recipe for disaster; and Corporate Exec's need to 
> realize that if they can't accomodate both situations (rapid development 
> _and_ secure coding), they're asking for a corporate disaster.

And there are tons of them out there.

-- 
Until later: Geoffrey		esoteric at 3times25.net

The latest, most widespread virus?  Microsoft end user agreement.
Think about it...

_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale





More information about the Ale mailing list