Essential PHP Security 132
Michael J. Ross writes "Given the remarkable popularity of PHP for developing dynamic Web sites, as well as the ever-increasing need for security on those same sites, one would think that there would be great demand for — and comparable supply of — books that explain how to create secure sites using PHP. However, such is not the case, and even the most extensive general purpose PHP books may only devote a single chapter to this critical topic, if that much. Essential PHP Security, written by PHP expert Chris Shiflett, aims to fill the gap." Read the rest of Michael's review.
Essential PHP Security | |
author | Chris Shiflett |
pages | 109 |
publisher | O'Reilly Media |
rating | 7 |
reviewer | Michael J. Ross |
ISBN | 059600656X |
summary | A concise introduction to PHP security principles and practices. |
O'Reilly has a Web page for the book, where they offer a sample chapter (Chapter 4: Sessions and Cookies), in PDF format, as well as the book's table of contents, index, errata, and links to the online version of the book, in O'Reilly's Safari service. As of the writing of this review, the confirmed errata is reassuringly sparse, and the unconfirmed errata is nonexistent, which speaks well of the author keeping on top of reader feedback — a worthy quality not shared by all technical writers. The author also has his own Web site dedicated to the book, where he has posted a table of contents, brief reader reviews, and two free chapters in PDF format: Chapters 2 (Forms and URLs) and 4.
In the book's forward, Andi Gutmans briefly explains how increasing Internet usage has resulted in a corresponding increase in security risks, for individuals and businesses operating online. He also notes that most of the security problems related to PHP-based applications, are not the result of weaknesses in the language itself, but rather in the way that developers have used the language in creating those applications. The intent of the book is to bring together the guidelines and lessons learned for writing secure PHP code, into a single volume. He concludes by noting that most of the principles presented in the book apply equally well to other Web development languages.
The bulk of the book's material is organized into seven chapters, focusing on the following topics: forms and URLs, databases and SQL, sessions and cookies, includes, files and commands, authentication and authorization, and shared hosting. These are preceded by an introduction, which oddly is labeled as a chapter. The true chapters are succeeded by three appendices, which cover the topics of configuration directives, functions, and cryptography. A short index rounds out the volume.
In the introduction, Shiflett presents the security-related PHP features, principles, and best practices that he uses as a foundation throughout the rest of the book, when focusing on the specific PHP topics covered by all of the subsequent chapters. The two features of PHP discussed are: register globals, of which most experienced PHP developers know the dangers, and PHP's error reporting capabilities. The four principles espoused by the author for writing secure PHP systems are: safeguard redundancy, minimum privileges, clarity through simplicity, and minimizing data exposure. The heart of the book appears to be his four recommended practices: tempering usability with security, tracking input and output data, filtering all input, and escaping or encoding output to preserve its meaning.
The seven topic chapters that follow the introduction provide fairly terse coverage of how those principles and practices are put to use, when designing and implementing forms, URLs, SQL commands, sessions, cookies, etc. Each subtopic within them is discussed briefly, and illustrated with code snippets.
If anyone is well-suited to writing such a work, it is Chris Shiflett, a well-known authority on PHP security, a respected contributor to the PHP community, founder and spokesman of the PHP Security Consortium, and founder and President of Brain Bulb, a PHP consulting firm.
In light of the author's expertise, one would presume that he would make every effort to write the definitive volume on PHP security — covering every conceivable topic, including: execution of system commands, verification of user IDs and authorization, e-mail spamming via Web forms, (the related topic of) exclusion of bots, and remote procedure calls. However, Essential PHP Security does not discuss those critical matters specifically. Moreover, the topics chosen are discussed in a rather cursory manner. The code samples throughout the book are generally quite minimal, with little to no explanation as to how they work. In addition, many of the techniques presented are but variations on the theme of "filter user input." These weaknesses may be why the book clocks in at only 109 pages. In fact, the seven core chapters comprise only 71 pages, leaving the reader to wonder how PHP security could possibly be adequately plumbed by such a short treatment.
On the other hand, there is something to be said for terse writing, as wizened fans of Kernighan and Richie's C language classic can attest. In agreement would be any developer who has purchased one of the many 700+ page technical tomes that turn out to be padded with excessive margins, poorly-tested code, and pointless appendices lifted from the respective products' documentation. Perhaps Shiflett intended his book to be more a primer on PHP security, rather than a comprehensive coverage — and hence the title of the book. As such, it would primarily be of value to PHP developers unfamiliar with basic security pitfalls and defenses. Regardless, any PHP developer would be wise to begin with this book as a first step towards PHP security mastery, but even wiser if they were to follow it up with more substantial works, as well as keeping current by reading security-focused Web sites and other current publications.
Michael J. Ross is a freelance writer, computer consultant, and the editor of PristinePlanet.com's free newsletter."
You can purchase Essential PHP Security from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Rule #1 (Score:3, Insightful)
'Nuff said.
Huh? O.o (Score:2)
While you CAN control whether people can access your website or not, you CANNOT control what number of amateur insecure scripts reside on the same host.
Where I work, we've had a number of problems due to using a shared host for our website. Mass site defacements is one of them.
Re:Huh? O.o (Score:2)
Re:Huh? O.o (Score:3, Informative)
Re:Huh? O.o (Score:2)
Re:Rule #1 (Score:2, Informative)
The book is about PHP script security. You could have the most secure server in the world but if your scripts allow unfiltered user input then you're still screwed. NO amount of server securitty will help that.
Re:Rule #1 (Score:2)
Of course, that's rule #2
Rule #3 (Score:2)
Re:Rule #1 (Score:2)
virtual private servers are an option and quite handy to have arround as a general box to throw stuff other than websites on that you wan't internet accessible but are a fair bit pricer than normal webhosting.
Re:Rule #1 (Score:4, Informative)
The author specifically deals with this issue in Chapter 8 [phpsecurity.org].
As Ben Franklin once said... (Score:4, Funny)
(*sniff, sniff*... mmm... do I smell karma roasting?)
Re:As Ben Franklin once said... (Score:1)
Re:As Ben Franklin once said... (Score:1)
I believe they are called book reviews.
a first for everything (Score:3, Informative)
I think the reviewer hit just about everything important about this book. The only thing I would add is I didnt feel the discussion about sessions was in depth enough. Nothing about how session data is actually stored on the server or how to secure it.
other than that great book, because it is so short everything is easy to find.
Better session system (Score:5, Interesting)
Also the advantages of doing this:
1. You are given the option to separate the user sessions database from page navigation/scripts on different servers if you anticipate massive amounts of traffic someday and want a cluster of servers.
2. It is not less efficient than the PHP session system. The native PHP sessions are file-based and also access the disk. With the user account_id as a primary key as a part of their cookie, session data access is very fast, perhaps faster in some cases.
It wouldn't surprise me if that is why the author doesn't talk about PHP sessions much. Extremely high-traffic applications shouldn't use them IMO.
Re:Better session system (Score:3, Informative)
Re:Better session system (Score:5, Insightful)
It's not clear from your comment, but you are aware that file-based sessions are just the default in PHP, aren't you? You can implement everything you say within the existing PHP framework by using session_set_save_handler() [php.net]. You don't have to drop PHP's session handling entirely, just implement your own de/serialisation functions and give them to PHP.
Re:Better session system (Score:1)
Re:Better session system (Score:2)
Christ Shiflett (Score:5, Informative)
What are the credentials of Chris Shiflett? He's widely touted as a "PHP security expert", but Stefan Esser [php-security.org] has a beef with him, and claims that this book contains serious flaws and misunderstandings [php-security.org].
I understand that people in the public eye like book authors are vulnerable to any crank that comes their way, but the problems that Stefan has highlighted do seem to point to a severe credibility problem, and Stefan, while prone to flaming, certainly knows what he is talking about.
In the interests of fairness, you should also read Chris Shiflett's response [shiflett.org].
Re:Christ Shiflett (Score:5, Insightful)
Re:Christ Shiflett (Score:3, Insightful)
After reading the post I don't really give a shit what Stefan Esser has to say about the book. Yes there's a flaw, but you won't convince people with such an inflammatory blog post. It looks like he scanned everything to find some flaw so he can rip Chris a new one. I would question if, perhaps, he's envious
Re:Christ Shiflett (Score:3, Informative)
I think you misunderstood the point of the logging example. It doesn't work properly in the default configuration, the only circumstance in which it would work properly is if the server was set up in a really insecure way, and the reason why the mistake isn't immediately obvious is due to sheer dumb luck. Those three things are pretty damning when they come from a supposed PHP security expert, wouldn't you say?
Re:Chris Shiflett (Score:4, Informative)
http://phpsecurity.org/reviews [phpsecurity.org]
http://phpsecurity.org/errata [phpsecurity.org]
You'll be hard-pressed to find anything beyond simple typos and unclear sentences, I think, and the reviews have been very positive.
Re:Christ Shiflett (Score:1)
Re:Christ Shiflett (Score:3, Interesting)
He's also the first man to crack the Xbox using software-only exploits.
He's got a solid set of credentials. I happen to respect both Stefan and Chris, and I've found value in the work of both
Re:Chris Shiflett (Score:2)
The reply by Chris Shiflett you point to is in response to a much earlier comment [hardened-php.net] by Stefan Esser. It is not a reply to the comments Stefan made with regards to his book.
Two thumbs up (Score:4, Informative)
Looking for a more holistic approach? (Score:4, Informative)
Cheers!
Re:Looking for a more holistic approach? (Score:1)
The problem is not PHP security (Score:4, Informative)
A good code on that (and a lot more) probably would be Code Complete, and Code Complete2
Re:The problem is not PHP security (Score:5, Insightful)
1. Developers switching languages who need to know how to implement these security practices in a new language - when I moved from ASP to PHP and others (thank God!) I had to rebuild much of my code library in a new language. Obvious things (to me) like input validation were just a little more difficult without a resource. I've had formal programming education and plenty of real-world experience - now it's just a matter of porting the concepts from one technology to another.
2. New developers that don't have any idea about secure programming practices - many web developers become programmers to meet their clients' needs. These developers often go from designing and building static websites to building database-driven apps. Whereas your brochure site usually doesn't need to validate input, your web app does - from SQL injection to cross-site scripting, these concepts are foreign to someone.
Re:The problem is not PHP security (Score:2)
Except that they are out there, and they call themselves PHP Programmers.
It's easy to pass judgements as above when you don't have to deal with the mechanics of enforcement. Would you rather pass some law or decree for what constitutes a "programmer", or make it clear, immediate, and obvious that a "programmer" needs to keep certain things in mind as they develop?
I lean heavily towards the latter - I've been a "PHP programmer"
Re:The problem is not PHP security (Score:3, Insightful)
There is also a huge gap between languages (or widespread modules features or idioms of the language) helping the writing of secure code, such as Ruby's string having a taintedness flag or Python's DBAPI2, languages that don't go either way, and languages that are just stupid and hard to secure by design.
And PHP is the latter. Globals, magic_quotes, 15 different functions to escape quotes in DB requests (14 of which don't work, or only work when the moon is green and you have red socks), retarded APIs, stu
Re:The problem is not PHP security (Score:2)
Re:The problem is not PHP security (Score:2)
PHP Security Book Roundup (Score:4, Informative)
Support the Author (Score:5, Informative)
http://phpsecurity.org/buy [phpsecurity.org]
You get the book for less than $20.
Re:Support the Author (Score:1)
How much less support will you get if we hit AddAll [addall.com] or BookPool [bookpool.com] [1] and get the book+shipping for the price of Amazon?
_________________________________
[1] Although it's out of stock at BookPool.
Re:Support the Author (Score:2)
cursory mannerisms (Score:2)
Here! This is what I mean! YOU figure out the rest!!
[html]
[head]
[title]
PHP Code sample etc. etc. etc.
Re:There's a wonderful utility that secures PHP (Score:2)
Mod parent WRONG (Score:3, Funny)
FYI to other readers of parent comment, that does nothing to help secure PHP or your PHP code. It won't even run my sample application below:
Re:Mod parent WRONG (Score:1)
Also, I tried that on my machine without Tomcat and it didn't do anything, either.
If an echo execs and there's no string to ... (Score:1)
Re:Mod parent WRONG (Score:2)
But to answer your questions anyway,
What is setting an HTML form action to a directory supposed to do?
I dunno, I typed this in 5 seconds for a
Also, doesn't the input tag require a type attribute?
Input defaults to type="text".
Does your browser handle "post" as opposed to "POST" properly?
The form you typed in to post that comment has "post" instead of "POST".
Have you tried escaping the inner quotes on the third line?
Escaping the i
Re:Mod parent WRONG (Score:1)
Also, have you tried it without Tomcat?
As for the post vs. POST distinction, I thought I had read that some browsers couldn't read post correctly, but I can't find the source now.
Re:Mod parent WRONG (Score:2)
exec("echo \' your name is: ".$_POST['name']." \'");
Re:There's a wonderful utility that secures PHP (Score:2, Interesting)
Response to the Review (Score:5, Interesting)
I wanted to reply to one thing, because it's a very valid point:
I deliberately chose to focus this book on the 80%, and I'm actually happy that I did. PHP's reputation suffers because of security concerns, and I'm sure you'll see some of that expressed here. I want PHP developers who read this book to focus on what's most important, and the principles and practices that they learn along the way should prepare them to deal with more minor concerns.
The execution of system commands is covered, but you're right that email injection is missing. HTTP response splitting is another. The second edition might include these, but they really boil down to the same thing as so many other vulnerabilities. If you filter input and escape output, neither are a concern. (After a recent change to header(), HTTP response splitting is no longer a concern, but we'll have to work with older versions of PHP for quite some time.)
Thanks for reading, and I hope it helps!
the book, and real world systems security (Score:2)
I'd like to invite you and encourage you to master the ten domains of the Common Body of Knowledge (www.isc2.org) and to take the CISSP exam. Obviously you have a lot to contribute and are eager to do so. One of the major benefits of the CISSP exam is that it shows that you're well-rounded and can converse, at least on a basic level, about all parts of security. The challenge faced by all security professionals is to be comprehensive, which involves, among other things, realizing the limitatio
Re:the book, and real world systems security (Score:1)
Essential PHP Security (Score:1, Funny)
Re:Essential PHP Security (Score:1)
Re:Essential PHP Security (Score:1)
The real problem with PHP and security (Score:2, Interesting)
This book might address how to code in PHP more securely, but that is not going to address the much more perceivable problem of "THIS SITE HAS BEEN H4X0RZED".
What's needed is for some *real* professionals to sit down and go through all the popular open source packages - phpbb, nuke etc - and identify and remove as m
Re:The real problem with PHP and security (Score:2, Informative)
Trouble with this sort of job is that the real professionals also happen to charge a fortune for their services, and that's something that most open-source projects can't afford.
Re:The real problem with PHP and security (Score:1)
That's a great start, but it needs to be done on all of the massively popular packages.
Trouble with this sort of job is that the real professionals also happen to charge a fortune for their services, and that's something that most open-sourc
Re:The real problem with PHP and security (Score:2)
Looking around for a replacement I found SMF... which inisists as part of its install you make all your files and directories chmod 777.. an curiously the author has no problem with this (and even tries to say this is not
Re:The real problem with PHP and security (Score:3, Informative)
The problem is not PHP (Score:3, Funny)
No book can teach you because the bad don't read (Score:3, Insightful)
Yuck.
To look at the code I am once again reminded why I always feel sick when someone tells me that I am going to have to work together with a person with a degree. As far as I know they passed with this project yet it is totally and utterly crap. Oh of course it does not work cross-browser. Yes it has many bits of codes wich don't actually doesn't do shit. A 100 line switch statement that always does the same thing for instance but that ain't the worst of it.
The worst of it is that security is non-existent. They use the old '?page=page1' in the url to switch content. I like this approach in itself as it leaves you with only 1 code file wich is accessible from the outside. I also like to make fucking sure that 'page' is filled only with values that I expect. They just insert it in an sql statement and execute it.
Shudder.
Could a book teach guys like this about security? NO.
It is not the first time I see shit like this. To many IT students just are to young and naive to think about security. Or rather to not think about security but just do it. Nobody had to teach me that trusting userinput is bad. I know it is. How?
Well, I don't know I just do. Perhaps it is all the years of low level cracking of games where you alter a string somewhere to give you more health/money whatever. Perhaps it is just being a suspicious bastard.
Security is not a set of easy to follow rules, security is not trusting people.
PHP is a usefull enough language that unfortunally in its basic install comes with some features that can really bite you in the ass. I always disable them on any server I control and then have to spend a lot of time correcting everyone elses code to work on a secured server. Oh and if I see one more person use PHP native sessions I am going to kill that motherfucker. Especially when it is used to store 1 value. Just use a fucking cookie instead of glogging the HD in resource eating insecure way.
ANyway, the review of the book? Well it covers the very basics. If you still need to be told this, just stay away from the web. This is akin to a cooking book telling you not to have a boiling pot of water on the first burners of your stove when a little kid is around. What I read of it all falls into the 'duh' category.
Re:No book can teach you because the bad don't rea (Score:2)
Like any other job, it takes a while to actually get good. It's not unique to the computer industry.
Re:No book can teach you because the bad don't rea (Score:1)
Re:No book can teach you because the bad don't rea (Score:1)
Re:No book can teach you because the bad don't rea (Score:1)
Re:No book can teach you because the bad don't rea (Score:1, Interesting)
Re:No book can teach you because the bad don't rea (Score:2, Interesting)
Oh and if I see one more person use PHP native sessions I am going to kill that motherfucker.
Do you have any examples of the alternatives? On the whole these methods seem very straightforward (and I use the first method myself) but I'd very much like to learn alternate, more secure ways of doing this kind of thing, especially as they are the most common ways to access and deliver content.
Re:No book can teach you because the bad don't rea (Score:2)
As for native sessions, I don't know why he's so vehement against them, but implementing session stuff yourself isn't to hard. When a user logs in, generate a unique ID, give it to them in a cookie and store it in a database table. At the top of every page, have a
Someone else already answered for me (Score:2)
What happens when someone alters the url by hand, to say something like ?page=fuckofyoufuckingfucker.
Well nothing, except it won't load a page (probably I don't know what you called your pages) but what if they actually make it more complex and insert a complete sql statement with
Re:Someone else already answered for me (Score:2)
A) It's enabled on nearly all servers running PHP, except for some which m
Re:Someone else already answered for me (Score:2)
$db->query ('SELECT * FROM pages WHERE page = ?', array ($_GET['page']));
PEAR::DB [php.net] makes it possible to query databases from PHP without going insane.
Save some money by buying the book here! (Score:1)
HackThisSite.org? (Score:1)
Best PHP Security Tip: (Score:1)
http://www.php.net/?=PHPE9568F36-D428-11d2-A769-0
Shared server admin (Score:1, Interesting)
Re:Shared server admin (Score:1)
Perhaps if people learned the OS they use .... (Score:4, Informative)
The reason you see PHP being exploited is not the security of the host OS, not the security of PHP (well almost never) , its the lack of knowledge by the person owning the computer hosting the sites and companies like The Planet [theplanet.com] who hand them out to literally anyone with a Paypal account or credit card number.
I can in 20 minutes show any experienced Linux system administrator how to run PHP completely wide open as far as functionality is concerned on a shared hosting environment and how to do it relatively safely.
Your average web hosting company is a business person who has money to buy servers with idiot proof (nearly) control panels such as C-Panel / WHM [cpanel.net].
They're also likely to come with RHEL, Centos 3 or 4 or Fedora. Very rarely do I see a Debian server used in a shared hosting situation (That should also tell you something).
These boxes are not secure yet they go immediately into production.
SO! To anyone who cares, (and reads this far) here is Tinkertim's checklist :
1 - Egress filtering (firewall the damn box),
2 - Get rid of that fat, bloated leaky modular kernel. Monolithic kernels are too easy to build not to do it. Don't forget to keep iptables, test with your firewall when done.
3 - Seek and loop world writeable directories, or mount them as noexec. Even doing that is not going to save you all of your trouble. As nobody I can run
4 - Don't even THINK about using apache/proxy on a shared hosting setup. Thats just incredibly stupid and self destructive.
5 - Look around in
6 - Get rid of what you don't need. Rename what you do and use scripts to help govern them. Lynx / wget / POST / GET (and everything else RHEL/Centos comes with) can be used to do dastardly things. Take advantage of user / group ownership that is found in Unix.
7 - lsof is your friend. Write a script to check for open accepting inet sockets that don't belong.
8 - (finally) VERIFY YOUR ORDERS
Web hosts are the scurge of the planet. I know , I am one
I may just re-post later or re submit with that list too. I'm off the soap box now. My point is this. We (shared web hosts) made this problem. We have a responsibility to admit it and stop it. I'll work on some checklists and scripts to do it for the lazy bastards and GPL them. Tired of people getting rich writing books making hype about what (should be) a very trivial issue.
Re:Perhaps if people learned the OS they use .... (Score:1)
it tells me that the majority of the people running these things want paid support for their OS (fair enough), nothing more. I don't know what that has to do with 'Essential PHP Security'
Re:Perhaps if people learned the OS they use .... (Score:1)
Re:Perhaps if people learned the OS they use .... (Score:1)
Re:Perhaps if people learned the OS they use .... (Score:1)
Then the voices in your head are wrong.
The most common webhost linux flavour is Fedora Core, which is not to be confused with the commercially supported Red Hat Enterprise Linux.
Must-have for all the PHP developers (Score:3, Insightful)
One of the things I liked about this book is that you don't need to be sat next to your PC to read it. Though it has many nice and clear code examples, it's mainly about principles and theory. Excellent to have on the bedside table.
It isn't a very thick book, but is written in a clear and accessible style, and I found myself going 'aha' all the way through. I read it quickly but have a feeling that I'll return to it often until all those best practices are memorised and I'm 'doing' them.
What is most useful about this book is the aggregation in one place of descriptions of all of these security attacks and vulnerabilities in PHP code, along with suggestions on dealing with them.
The only specific attack missing which I would like to have seen information about is email spamming through website forms. However the general principles described in the book will help prevent these attacks as well.
This book will definitely be a long-term desktop reference for me and mandatory reading for all the PHP developers in my work place. I would definitely reccomend this book to aspiring PHP developers and think it would also benefit some of the more experienced folks out there.
--
Webmaster of Spy [e-spy-software.com]
This book will look great next to ... (Score:2, Funny)
Laugh, it's funny....
hah (Score:1, Flamebait)
Re:What's the big deal? (Score:2, Informative)
Re:What's the big deal? (Score:1)
Re:Wrong answer (Score:2, Insightful)
Re:Wrong answer (Score:2, Insightful)
Lets see, I work in the security area for my employer and have done web development (not design) work as well. I say that PHP can be used to create rich dynamic sites that are secure. So, now, would you care to back up your accusation of PHP as a programming language being insecure with some real facts?
Sure, there have been holes in countless PHP applications. However, this is not the fault of the language. In fact, almost all of these problems come down to programmers not properly validating user inpu
Re:Wrong answer (Score:5, Insightful)
The same reason that MySQL is crap, because you really, really need stored procedures, views and transactions to keep track of 20.000 messages in 1.500 threads?
The same reason that Java sucks for everything, always and C never does?
The same reason that compiled languages are always better than interpreted ones?
Of course, that reason I'm referring to is arrogance.
Don't get me wrong. I'm actually halfway to a MSc in Computer Science, and frequently have my ego challenged by kids and their flash 'applications', drag'n'drop VB crap and funny web apps that trust me to let it pass critical information in the URL.. These kids tend to think that I'm learning useless crap because they already know. Naturally I'm all warm inside when I get to give their 'application' 500% speedup by adding an index to a table.
But what makes PHP itself unsecure? Yes, PHP wants to be proporly configured. And if you let 50 kids run amok on the same server, sure they'll fuck something up (though never outside of the PHP user).
Now imagine a production webserver, to where only qualified developers has access, and only tested PHP code is put on. Works for me, has for a long time.
Oh, and concluding that all PHP is paint by numbers because it's a scripting language is just ignorant.
#include stdio.h anyone? Not enough of a real man to write your own IO routines, so you're stuck with gluing together libc stuff "in a paint-by-numbers style"? bah..
Proof is in the pudding (Score:1, Flamebait)
Re:Wrong answer (Score:1)
Re:Wrong answer (Score:1)
Re:PHP/CSS and Safari (MAC)... (Score:2)
Re:PHP/CSS and Safari (MAC)... (Score:1)
( Enter your web site URL into http://jigsaw.w3.org/css-validator/ [w3.org] )
It looks like you have some parse errors in your CSS.
Maybe those are causing Safari to mis-render it ?
Re:PHP/CSS and Safari (MAC)... (Score:2)