--- Video Populares et Optimates <[EMAIL PROTECTED]> wrote:
> > If you mean to protect your source from your users, that is the case
> > already. Unless someone can compromise your server, they never get
> > access to the source, only its output.
> 
> True! But what for the network technicians, system administrators and
> web developers (to be very paranoid) that access the servers.

Well, then you start getting into the social aspects of security (which
are just as important, I agree) more than the technical ones. There are
file and directory permissions that can help you maintain who sees what,
but if you have Web developers who need access to the code but who you
want to protect the code from, it's a very difficult challenge (in my
humble opinion).

At some point, I think it is necessary to trust certain people within your
organization. This is a challenge that everyone faces.

> > This is far different from standard client-side applications, where
> > the user has a compiled version of the source. With server-side
> > applications, there is nothing for them to reverse engineer.
> 
> Yes, of course.. but with compiled software (built using asm, C/C++,
> VBA or what have you), it doesn't matter where the software is - on the
> user's computer or the server. All the same, it's compiled and a tough
> business to reverse engineer and make sense of.

I'll admit that it's tough for me, but I have some friends who are very
good at reverse engineering things like this, and they tell me that it's
easy (they may just be bragging, but I tend to believe them). My point was
that when you distribute an application to run on the client, you have a
practically unlimited amount of people who can try to reverse it. When you
only have a few people with access to a particular server (and a
server-side application), there are at least far fewer people who can poke
around.

The company I work for distributes a very popular file sharing application
that is used by millions of people around the world. The Windows
developers here use something called thinstall (I think that's the name)
in an attempt to make reversing the binary more difficult. They tell me
that it's still not a perfect solution, but that it is too easy to reverse
if they omit this step (which they did in years past). So, I thnk that
this is easier than it may seem.

> It does! Seeing that you have the additional title "hacker" at your 
> site I'm sure you know of my despair when it comes to internal hacking.
> ;-)

Well, my definition of hacker and yours might differ. :-)

Chris

=====
Chris Shiflett - http://shiflett.org/

PHP Security Handbook
     Coming mid-2004
HTTP Developer's Handbook
     http://httphandbook.org/
RAMP Training Courses
     http://www.nyphp.org/ramp

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to