Hi all,

I know the topic of auto-escaping user data comes up on here from time
to time. I just wondered if others had heard this.

http://www.twit.tv/floss12   PHP Creator - Rasmus Lerdorf

Say what you want about PHP (I'll happily join in ;-) ), but I found it
interesting to listen to the guy.  I would have thought he's learnt a
few lessons in all the time PHP has been on the front line.

At about the 40 minute mark (it might start a little earlier) Rasmus
talk about his ideas on how to deal with XSS style holes in PHP Code.
My take was this was a method he was already using at Yahoo.

Basically (for those who are too lazy / buzy to listen) he talks about
having a 'firewall' that incoming data passes through and is sanitized
by. Then all data is deemed safe for output. 'Holes can be poked in the
firewall' if you need to be able to enter HTML (for example). It struck
me that we could do something similar in the manipulators. They already
validate. Why not sanitize?

Key point is not to let the attack in the system, rather than to avoid
executing it.

Paul


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django developers" group.
To post to this group, send email to django-developers@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-developers
-~----------~----~----~----~------~----~------~--~---

Reply via email to