On Tue, 2008-12-16 at 16:02 +0000, Peter Ford wrote:
> tedd wrote:
> > I can't imagine evil code still working after someone resizes the file.
> > 
> 
> Yeah, but the uploaded OpenOffice Writer doc won't look too good either... :)
> 
> I prefer to move files to an off-line store, run them through a unix 'file'
> command (with a mime-type magic file) to get the mime-type, use that to decide
> whether or not to accept, and then serve them back to clients through a 
> script.
> As an optional step, on really paranoid systems, I run a virus scan over the
> upload (with clamav, usually).
> <troll>
> I'm not exactly sure what all the fuss is about protecting IE users from
> malicious code - if they care then they shouldn't be using IE, and if they 
> don't
> care they shouldn't be on the internet.
> </troll>
> Tim's efforts do seem to be a bit of overkill...
> 
> -- 
> Peter Ford                              phone: 01580 893333
> Developer                               fax:   01580 893399
> Justcroft International Ltd., Staplehurst, Kent
> 
Go one further; punish all IE users by infecting them...

Hmm, OK, so not my best or most serious suggestion maybe. I've relied on
having the OS report the file-type using the aforementioned file
command, and it seems to work OK. For really paranoid systems, I store
the file in a non web-accessible location and use  a binary safe fopen()
to stream the file to the user.


Ash
www.ashleysheridan.co.uk


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to