Pro PHP Security 105
Michael J. Ross writes "The global accessibility of Web sites is a double-edged sword: At the same time that your online e-commerce site is open for business to anyone with an Internet connection, it is also open to malicious attack. Web sites based upon the popular language PHP, are no exception. Thus, it is both astonishing and worrisome that there are currently so few books devoted to PHP security — particularly ones that go beyond the handful of typical security countermeasures discussed in articles. Fortunately, Pro PHP Security, written by Chris Snyder and Michael Southwell, is intended to fill this critical need." Read the rest of Michael's review.
Pro PHP Security | |
author | Chris Snyder and Michael Southwell |
pages | 528 |
publisher | Apress |
rating | 9 |
reviewer | Michael J. Ross |
ISBN | 1590595084 |
summary | A comprehensive guide to developing secure PHP-based Web sites. |
Pro PHP Security spans 528 pages, consisting of 24 chapters organized into four major parts. The first part, comprising only one chapter, explains the nature and significance of computer security, and reasons as to why absolute security is an unattainable goal. Nonetheless, it is worthwhile to take all appropriate and reasonable security measures, and the authors provide a brief overview of the different types of attacks to which Web applications are vulnerable.
On their Web site, Apress has a page devoted to the book, where they offer the book's source code (in a Zip archive file), the table of contents, corrections to the book (i.e., errata), and a sample chapter (Chapter 12 - Preventing SQL Injection) in PDF format. In addition, there is a link for any reader who would like to purchase this title as an e-book.
One of the most laudable aspects of Pro PHP Security, is that the authors — both experienced software and Web site developers — go far beyond the standard PHP security advice of validating and escaping user input, etc. Those topics are covered in depth, but they are provided in the context of thorough discussions as to how to set up a secure environment in which to use those techniques. In addition, the authors present best practices that have evolved over time, as Web masters and system administrators have learned — often the hard way — the general types of attacks to which their Web sites and computer networks have been subjected.
In fact, Snyder and Southwell hold off on presenting the aforesaid specific PHP security techniques, until the third part of the book. Prior to that, they explain the characteristics of a secure online computing environment, such as using encryption, securing network connections via SSL and SSH, controlling access via authentication and permissions, and other important topics. Their coverage of the subject matter is complete, without being overwhelming. For instance, the material on encryption is helpfully divided into two separate chapters — devoted to theory and practice, respectively. Consequently, a PHP application developer or system administrator can immediately dive into the authors' recommended practices for encoding sensitive data, without getting bogged down in the theoretical underpinnings, if the reader is in a hurry to implement encryption on their own systems, or simply has no interest in the theory behind the methods.
As noted earlier, Part 3 of this monograph explains all of the well-known techniques that crackers use for attacking PHP-based Web sites, as well as the countermeasures that should be adopted by the developer or maintainer of the site. First up is validation of user input, which — though being essential to basic security — is still neglected on far too many Web sites. The attention to detail seen in this discussion is also reflected in the subsequent chapters, which cover SQL injection, cross-site scripting, remote execution, temporary files, and session hijacking. For each topic, the authors explain how the typical attack is attempted, and what needs to be done to prevent such attacks.
The fourth and last major part of the book covers vitally important topics that are usually glossed over in most PHP security books, or neglected altogether. Snyder and Southwell explain methods of limiting access to your Web site to humans (thus minimizing attacks that employ scripts), verifying the identities of those users, authorizing what those users can do on your system, and tracking their actions once they have logged in. The authors also explain how to reduce the chances of data loss, and how to execute system commands and make remote procedure calls without exposing your site to vulnerabilities. The last chapter covers the benefits to be gained from opening up your site and its source code to a review by your technical peers.
This book has much to recommend it: The discussions of security issues are more complete and thorough than in any other book that I have seen. The information chosen by the authors is detailed enough to be understandable and usable, but not so excessive as to prove daunting or discouraging to the reader who needs answers to their security questions, and does not have the time or inclination to slog through academic or pointless discussion. The information is well-organized, and presented in context, so the reader is not simply given a laundry list of security techniques, but instead better understands the rationale behind them. Lastly, because no technical topic can be covered in full in a single book, the authors provide a generous number of references to outside resources.
The content of this book appears to have only one noticeable weakness, and that is the poor quality of the comments in the sample source code. Not only are they few in number and lacking in detail, but they are written in all lowercase letters, with little to no punctuation. This coding style results in the comments visually blending in with the code itself, and makes reading both to be more difficult than is justifiable.
The physical book itself also has only one weakness, and that may only apply to a portion of the copies produced and distributed by the publisher. Specifically, the bottom and side edges of the book are cut cleanly, while the top edge is quite rough. As I was unable to find any mention within the book as to a possible reason or advantage for having the rough edging on top of the pages, I can only conclude that it was not intended on the part of Apress, and represents an error in production. I hope that the copy that I received — kindly given to me by the publisher — is not representative of all the copies produced and sold.
In spite of these minor complaints, I was quite pleased with this book. Pro PHP Security is arguably the most comprehensive PHP security book available, and is highly recommended to any developer or administrator of a PHP-based Web site.
Michael J. Ross is a freelance writer, computer consultant, and the editor of the free newsletter of PristinePlanet.com."
You can purchase Pro PHP Security from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Observation on Competitors (Score:3, Informative)
Here is an observation: With all the publicity Ruby on Rails [rubyonrails.org] and other frameworks like Zend Framework [zend.com], Turbogears [turbogears.org] and the like are receiving these days--why are we not seeing an innumerable number of security trolls like Chris Shiflett on the *framework side of web development? My thoughts are that PHP users are told "you can too" when in many cases, with forums other resources like the ten gazillion books, they *can*, to an extent (but either with really bad help or books assuming the reader is not working on a *real* project).
Conversely, Rails, Turbogears and Symphony are, too, saying "you can too." Yet, where are the security trolls? It seems though that the *actual* users of the *frameworks, the ones using them for real-life projects are those who have struggled with PHP and (perl, python, etc...) CGI programming for so long and decided "fuck it." Things like database abstraction (and therefore quoting, etc), single-entry-point, and template-safety are, in the most part, taken care of for you.
P.S. XSS is not a PHP problem!
Re:Observation on Competitors (Score:3, Interesting)
A good programmer can also make mistakes, but if there is a decent thinking person and a small plan, then it will imho be
Re:Observation on Competitors (Score:3, Insightful)
For example, Microsoft's infamous Foundation Classes (MFC) relies heavily on IDE wizardry and arcane preprocessor abuse to make things "simple".
On the other end of the spectrum, RoR just generates straightforward code using a sensibly chosen patterns. If somebody handed you the output of RoR, and you'd never heard of RoR, it would be perfectly readable and maintainable. RoR (or any framework for that matter) can't solve your problems for you; from what I
Thinking is the key concept (Score:1)
Unfortunately, this is not a luxury that some website owners/creators have the luxury of...
On a more serious note. At lot of sites are "set it and forget it." Probably less that actually do e-commerce (or any volume of it). But I even do it every now and then...I just updated my libraries and packages, so its all good, nothing to worry about. Then a week goes by, a month...and the window is opened.
Maintaining
Re:Observation on Competitors (Score:1)
Re:Observation on Competitors (Score:1)
Forgot?!?!
Besides the SQL insertion hype, there are many web applications that serve inserted content into documents without any further validation. There was an article about RFID, " Virus Jumps to RFID [slashdot.org]," and it is like RFID in this sense of validation. Someone scans, or http-gets, for data and it is served. The data actually might come from the expected object/webserver, but there may be other data inserted al
Re:Observation on Competitors (Score:3, Funny)
No exception? (Score:4, Funny)
Dueling Oxymorons (Score:3, Funny)
YES!!! I NEARLY WET MYSELF (Score:1)
Re:Dueling Oxymorons (Score:2)
Re:Dueling Oxymorons (Score:1)
Re:Dueling Oxymorons (Score:1)
Top Edge PHP Attack (Score:5, Funny)
This is because someone tried to do a physical attack on the top edge of the PHP Security book.
However, the Page's Horizontal Periphery security kept it from getting through.
User/role management (Score:2)
Are there any secur
Re:User/role management (Score:2)
I don't know of any general-purpose libraries, but the latest version of Wordpress has a system [wordpress.org] like that that you could rip out.
Re:User/role management (Score:2)
Downside: it probably won't work with PHP
Re:User/role management (Score:3, Informative)
http://pear.php.net/package/LiveUser [php.net] supports users from multiple sources (at the same time), group permissions and per-user-permissions.
Re:User/role management (Score:2)
Re:User/role management (Score:2, Informative)
On top of your script, do
ini_set('include_path', ini_get('include_path'). ":pear/");
Done.
I can't remember if it is include_path or something similar, but after 14 hours at work, I am not gonna look it up
Re:User/role management (Score:2)
Re:PHPGACL? (Score:2)
Re:User/role management (Score:2)
PEAR::Auth & PEAR::LiveUser (Score:2)
Try this : http://pear.php.net/packages.php?catpid=1&catname
The problem with the alternatives to PHP (Score:5, Insightful)
Ignoring support by ISP's there is are two main reasons I think from the developers perspective,
1) PHP's online documentation of both the core language it's standard libraries is comprehensive. I'm not even aware of where I could find documentation on Python libraries to communicate with MySQL, with PHP it's all shipped in the package and all documented in one place - php.net. One place I might add where users/developers can and do comment and actually make the documentation better and clearer (although some bad ideas get into the mix too, they are usually corrected by following comments). All the Python and Ruby documentation seems to be humped into two ends of the spectrum, 101 and web framework. Atleast this is the impression I get as someone once interested in Python for web development, after being spoilt for documentation at PHP it's just frustrating.
2) PHP allows you to inline your code into your documents (as does ASP) providing a, nasty, dangerous yet incredibly easy route for people from a web design background to get into web development without any programming knowledge. As these users develop, some will become well seasoned and actually start to seperate code from design. The rate at which people are being introduced to server side scripting and indeed PHP is, in my opinion, probably increasing and there is always, for that reason, alot of unsavvy PHP users.
It's also worth mentioning that to a certain extent, Ruby on Rails gems (which I haven't used personally) and Perl's CPAN solve some of the shortfalls, but Python seens way behind.
Re:The problem with the alternatives to PHP (Score:3, Insightful)
Re:The problem with the alternatives to PHP (Score:2)
I am however implicitly responding to posts that always arise saying "Don't use PHP! It's a shit poorly designed language use (Python|Perl|Ruby)".
Oh and I also disagree with PHP for anything but web applications. I'm glad you mentioned it.
Re:The problem with the alternatives to PHP (Score:2)
echo "update x set y=y+1 where z=a" | mysql -uuser -ppassword mydatabase
just seems like a nasty hack.
I'm not saying it should be used for desktop gui apps though
Re:The problem with the alternatives to PHP (Score:2)
Re:The problem with the alternatives to PHP (Score:2)
Re:The problem with the alternatives to PHP (Score:2, Informative)
Re:The problem with the alternatives to PHP (Score:2)
Re:The problem with the alternatives to PHP (Score:2)
I guess the decision for those language de
Re:The problem with the alternatives to PHP (Score:1)
100% Troll..
Re:The problem with the alternatives to PHP (Score:4, Insightful)
That's the #1 issue by far. Even if all the competition were ten times better than PHP, if the average person can only find cheap PHP hosting, that's what they are going to use.
Seriously? Go to python.org. Scroll down the page to where you see the "Using Python for... databases" link. Click it.
There's another point - Python modules come with help built into them, and Python comes with a help browser [incutio.com]. And if you don't want to use that, just load the Python interpreter and run help(module). I don't think PHP has anything similar to that yet.
So does mod_python [modpython.org].
Re:The problem with the alternatives to PHP (Score:2)
"Pydoc is awesome; I don't know how I missed it for so long".
I think this only puts emphasis one of my points. Thanks for the links, I will be investigating Python myself thoroughly at some point, but my post is based on initial impressions of web development in other languages, something I think is obviously vital for the uptake of a language in web dev.
Re:The problem with the alternatives to PHP (Score:2)
Well, my host runs mod_perl, and my local server runs mod_perl. I'd gladly learn to use Perl, if only I could figure out how to run a Perl script. With PHP, I simply suffix a file with .php, and any code between PHP tags will be executed. Apparently, it's not this simple with mod_perl.
With bash, all I have to do is put #!/usr/bin/perl at the start of the file. But no matter what I try, I can't get Apache to execute a
Re:The problem with the alternatives to PHP (Score:2)
Re:The problem with the alternatives to PHP (Score:2)
What? My webserver? As in, the one owned by the company who provide my hosting? Are you suggesting that I root their datacentre and reconfigure my account on the sly? Are you suggesting that they advertise themselves as providing mod_perl while leaving it completely unconfigured?
PHP has worked out of the box on both hosts I've used, and on every version of the XAMPP [apachefriends.org] package I've installed. Even on the vanilla Slackware Apache setup, all I have to do is uncomment the PHP line in /etc/apache/httpd.conf.
As f
Re:The problem with the alternatives to PHP (Score:2)
then perhaps you should ask them for support instead of whining on slashdot that "perl is teh hard omgplz!11one"?
Re:The problem with the alternatives to PHP (Score:2)
Re:The problem with the alternatives to PHP (Score:2)
Funny, I just did this and couldn't find it. I ended looking at some sourceforge boilerplate. I think the OP was pointing out that PHP has comprehensive and *consistent* documentation.
Re:The problem with the alternatives to PHP (Score:2)
I just did the same thing. There's a sidebar named "Using Python for..." on the right hand side. "Databases" is the second entry:
# Databases
# ODBC, MySQL, Others
How much easier does it have to be to find?
Oh, wait. You don't like the fact that it links directly to the site for the plug-in, I take it. Too bad. If you had bothered to check the "Docs" link on the Sourceforge page, you would have seen a link to "How to Use MySQLdb", which states:
"MySQLdb is compliant with the Python Da
Re:The problem with the alternatives to PHP (Score:2)
Re:The problem with the alternatives to PHP (Score:3, Interesting)
1. Ruby is a bitch to get working with apache. You've got to either run fastcgi (which is out of date), or proxypass to another webserver. They need to fix mod_ruby so that each instance doesn't share namespaces.
2. Python is stable, but the modules are too fragile. The API for libxml2-python has changed several times... breaking any scripts using it.
Re:The problem with the alternatives to PHP (Score:2)
It's a simple and fairly clean way to accelerate CGI style apps. It's so simple it doesn't usually need to be changed even if your webserver changes.
You can run your fastcgi apps on apache and zeus.
The apache mod_xxx stuff is more likely to give you problems.
PHP (Score:1)
Re:The problem with the alternatives to PHP (Score:1)
At least for me, PHP was easier to learn than Ruby or Python because it borrows a lot of concepts from C++ and C. The learning curve for a language is really important in its acceptance because it's great to be able to use knowledge you already have to enter a new field (for me, web applications).
Chris Snyder is a liar and a fraud. (Score:1, Interesting)
I've owned this book for a while (Score:3, Informative)
It's a good book to get started with PHP Security ideas. It has a lot of theory and explains a lot of issues. However, I don't like the examples or how the book uses the examples.
Often times I would have like to see a larger scale project outline shown, instead of just the theory. But, it was worth the purchase.
Save $15.30 by buying the book here! (Score:1, Interesting)
Do No tuse Global variables! (Score:2, Informative)
PHP Security in 5 sentences, Not 500 Pages (Score:3, Insightful)
First, you trim() and strlen() to make sure you have something. Then you use ereg to validate the hell out of it. Then you use the following function:
function quote_smart($value)
{
if (get_magic_quotes_gpc()) {
$value = stripslashes($value);
}
if (!is_numeric($value)) {
$value = "'" . mysql_real_escape_string($value) . "'";
}
return $value;
}
to prep the input for inserting into the DB. Finally, you call that in conjuction with sprintf to build the SQL you're going to call like:
$sql = sprintf("SELECT * FROM acct WHERE name=%s", quote_smart($name));
This looks like a lot of work but in practice it's really not that bad. Also, every website must do this. It's not like there's something wrong with PHP. Some environments might abstract this stuff a little but frankly I'd rather do it explicitly so that I know exactly what's happening.
Lack of PHP Security in 5 sentences, Not 500 Pages (Score:3, Informative)
For one thing, you're not protecting yourself from URL-encoded strings.
And since PHP doesn't yet support bind-variables (prepared statements) natively, looking at PEAR::DB [php.net] is a good idea; it saves you the hassle of quoting and whatnot.
You're also not dealing with the problem of XSS, since you've failed to deal with output to screen.
You are, in fact, not dealing with anything that's not related to MySQL.
Re:Lack of PHP Security in 5 sentences, Not 500 Pa (Score:1)
Re:Lack of PHP Security in 5 sentences, Not 500 Pa (Score:2)
Okay, I didn't consider these to be "native" when I wrote it, but I can see how you might want to consider them "native", and I didn't think it prudent to mention database-specific interfaces.
My recommendation for PEAR::DB is because it supports emulation of prepared statements for databases that don't support it na
Re:PHP Security in 5 sentences, Not 500 Pages (Score:1)
Take the following as an example:
bad_string="SELECT * FROM foo WHERE id=" + BAR_DATA_GOES_HERE
EXEC(bad_string)
Wouldn't the attacker need to know your data model pretty well. Wouldn't the attacker need a way of extracting the results of the query through HTTP response. In other words, what does a really good SQL injection attack look like? Sure, I could poss
Ten Bucks Cheaper at Amazon (Score:2)
-MS2k
PHP security: not what you think (Score:2, Informative)
Haste makes waste (Score:2)
Scary thought. If you are implementing encryption (or any security measure, for that matter), the last thing you should be in is hurry.
Pro PHP Security (Score:2)
Choose two.
Re:PHP is broken... (Score:1, Informative)
Re:PHP is broken... (Score:4, Informative)
Re:PHP is broken... (Score:1)
Re:PHP is broken... (Score:2)
Re:PHP is broken... (Score:1)
http://www.htdp.org/ [htdp.org]
Nice tip! (Score:2)
Other books, albeit not free (to my knowledge):
-Design patterns : elements of reusable object-oriented software, Erich Gamma, ISBN: 0201633612
-Patterns of Enterprise Application Architecture, Martin Fowler, ISBN: 0321127420
Would really enjoy some more free information.
Re:Nice tip! (Score:2)
Re:Nice tip! (Score:2)
Step 2: Structure and Interpretation of Computer Programs (http://mitpress.mit.edu/sicp/)
Both are available online in full text from MIT Press. I personally feel everyone has something to gain from these books, even if you have twenty years experience. Not that I do yet -- It's a projection.
PHP: Get over it (Score:2)
I remember (ah, memories) when I discovered PHP. I thought it was brilliant. I could write dynamic web pages! Wow! I had variables, and for loops, and while loops, and all sorts. It was amazing! Then I got a database up and running, and could actually make a site, o frabjous day, calloo, callay! This was bac
PHP is the right tool for the right task (Score:1)
You are either not a professional programmer or a troll or both. PHP is the best available language if what you need is a simple way of creating dynamic web pages that handle database access. One sees so many people making so many claims about Ruby this or Ruby that, but have you ever tried to compare both languages? Forget closures and block parameters, you don't need that to create a dynamic web site. What you need is a simple syntax that w
Re:PHP is the right tool for the right task (Score:4, Insightful)
The original poster has a point. I can think of a number of language features that were just plain bad ideas.
1. Providing an inconsistant programming environment, based on INI settings. This exacerbates the next two problems.
2. Having register globals turned on by default. First "fixed" in php.ini-recommended for PHP 4. Later fixed in php.ini-dist for PHP 4.2. Scheduled for removal from the language in PHP 6.
3. Having magic quotes GPC turned on by default. First "fixed" in php.ini-recommended for PHP 4. Scheduled for removal from the language in PHP 6.
4. Lack of a good database abstraction layer shipped with PHP. Although dbx and Pear DB both ship with PHP, neither is that commonly used. dbx due to being disabled by default; Pear DB due to its slowness. This is fixed in PHP 5.1 with the addition of PDO. Unfortunately, this is a case of too little, too late, as anyone who writes things for multiple DBs already uses ADODB or hand-rolls their own abstraction layer (coughphpBBcough).
Rather than waiting for a perl programmer to come along and post this url, I will: PHP in contrast to Perl [tnx.nl]. I know very well that this is slanted against PHP, but that doesn't make a lot of the comments in it any less true. Particularly since PHP 1 was written in Perl 5.
Re:Book's available for cheaper through Amazon (Score:1)
Re:Book's available for cheaper through Amazon (Score:1, Troll)