Re: Updated PHP breaks processing-intense Procedure

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



THank all of you for your help. I think I got this thing licked.


On Wed, Apr 24, 2013 at 7:14 PM, Ken Kixmoeller <phphelp@xxxxxxxxxxx> wrote:

> Thank you very much, Jim ---
>
>
> On Wed, Apr 24, 2013 at 5:34 PM, Jim Lucas <lists@xxxxxxxxx> wrote:
>
>> On 04/24/2013 03:24 PM, Ken Kixmoeller wrote:
>>
>>> Thanks, Jim ---
>>>
>>> Is this different from the "max_input_vars" discussion above? (from David
>>> OBrien)
>>>
>>
>> yes.  For example...
>>
>> php.ini:[suhosin]
>> php.ini:;suhosin.log.syslog =
>> php.ini:;suhosin.log.syslog.**facility =
>> php.ini:;suhosin.log.syslog.**priority =
>> php.ini:;suhosin.log.sapi =
>> php.ini:;suhosin.log.script =
>> php.ini:;suhosin.log.phpscript = 0
>> php.ini:;suhosin.log.script.**name <http://suhosin.log.script.name> =
>> php.ini:; variables registered in the current scope: SUHOSIN_ERRORCLASS
>> and
>> php.ini:; SUHOSIN_ERROR. The first one is the alert class and the second
>> variable is
>> php.ini:;suhosin.log.**phpscript.name <http://suhosin.log.phpscript.name>=
>> php.ini:;suhosin.log.**phpscript.is_safe = Off
>> php.ini:;suhosin.log.use-x-**forwarded-for = Off
>> php.ini:;suhosin.executor.max_**depth = 0
>> php.ini:;suhosin.executor.**include.max_traversal = 0
>> php.ini:;suhosin.executor.**include.whitelist =
>> php.ini:;suhosin.executor.**include.blacklist =
>> php.ini:;suhosin.executor.**func.whitelist =
>> php.ini:;suhosin.executor.**func.blacklist =
>> php.ini:;suhosin.executor.**eval.whitelist =
>> php.ini:;suhosin.executor.**eval.blacklist =
>> php.ini:;suhosin.executor.**disable_eval = Off
>> php.ini:;suhosin.executor.**disable_emodifier = Off
>> php.ini:; by default in Suhosin >= 0.9.6. Allowing symlink() while
>> open_basedir is used
>> php.ini:;suhosin.executor.**allow_symlink = Off
>> php.ini:; If you fear that Suhosin breaks your application, you can
>> activate Suhosin's
>> php.ini:; simulation mode with this flag. When Suhosin runs in simulation
>> mode,
>> php.ini:;suhosin.simulation = Off
>> php.ini:; first. It always uses resource slot 0. If Suhosin got this slot
>> assigned APC
>> php.ini:; will overwrite the information Suhosin stores in this slot.
>> When this flag is
>> php.ini:; set Suhosin will request 2 Slots and use the second one. This
>> allows working
>> php.ini:;suhosin.apc_bug_**workaround = Off
>> php.ini:;suhosin.sql.bailout_**on_error = Off
>> php.ini:;suhosin.sql.user_**prefix =
>> php.ini:;suhosin.sql.user_**postfix =
>> php.ini:;suhosin.multiheader = Off
>> php.ini:suhosin.mail.protect = 1
>> php.ini:; memory_limit to whatever value they want. Suhosin changes this
>> fact and
>> php.ini:; that Suhosin will disallows scripts setting the memory_limit to
>> a value above
>> php.ini:;suhosin.memory_limit = 0
>> php.ini:suhosin.session.**encrypt = Off
>> php.ini:;suhosin.session.**cryptkey =
>> php.ini:;suhosin.session.**cryptua = On
>> php.ini:;suhosin.session.**cryptdocroot = On
>> php.ini:;suhosin.session.**cryptraddr = 0
>> php.ini:; session. The difference to suhosin.session.cryptaddr is, that
>> the IP is not
>> php.ini:;suhosin.session.**checkraddr = 0
>> php.ini:;suhosin.cookie.**encrypt = 0
>> php.ini:;suhosin.cookie.**cryptkey =
>> php.ini:;suhosin.cookie.**cryptua = On
>> php.ini:;suhosin.cookie.**cryptdocroot = On
>> php.ini:;suhosin.cookie.**cryptraddr = 0
>> php.ini:; cookie. The difference to suhosin.cookie.cryptaddr is, that the
>> IP is not
>> php.ini:;suhosin.cookie.**checkraddr = 0
>> php.ini:;suhosin.cookie.**cryptlist =
>> php.ini:;suhosin.cookie.**plainlist =
>> php.ini:; Defines the reaction of Suhosin on a filter violation.
>> php.ini:;suhosin.filter.action =
>> php.ini:;suhosin.cookie.max_**array_depth = 50
>> php.ini:;suhosin.cookie.max_**array_index_length = 64
>> php.ini:;suhosin.cookie.max_**name_length = 64
>> php.ini:;suhosin.cookie.max_**totalname_length = 256
>> php.ini:;suhosin.cookie.max_**value_length = 10000
>> php.ini:;suhosin.cookie.max_**vars = 100
>> php.ini:;suhosin.cookie.**disallow_nul = 1
>> php.ini:;suhosin.get.max_**array_depth = 50
>> php.ini:;suhosin.get.max_**array_index_length = 64
>> php.ini:;suhosin.get.max_name_**length = 64
>> php.ini:;suhosin.get.max_**totalname_length = 256
>> php.ini:;suhosin.get.max_**value_length = 512
>> php.ini:;suhosin.get.max_vars = 100
>> php.ini:;suhosin.get.disallow_**nul = 1
>> php.ini:;suhosin.post.max_**array_depth = 50
>> php.ini:;suhosin.post.max_**array_index_length = 64
>> php.ini:;suhosin.post.max_**name_length = 64
>> php.ini:;suhosin.post.max_**totalname_length = 256
>> php.ini:suhosin.post.max_**value_length = 2048000
>> php.ini:suhosin.post.max_vars = 500
>> php.ini:;suhosin.post.**disallow_nul = 1
>> php.ini:;suhosin.request.max_**array_depth = 50
>> php.ini:;suhosin.request.max_**array_index_length = 64
>> php.ini:;suhosin.request.max_**totalname_length = 256
>> php.ini:suhosin.request.max_**value_length = 2048000
>> php.ini:;suhosin.request.max_**vars = 200
>> php.ini:;suhosin.request.max_**varname_length = 64
>> php.ini:;suhosin.request.**disallow_nul = 1
>> php.ini:;suhosin.upload.max_**uploads = 25
>> php.ini:;suhosin.upload.**disallow_elf = 1
>> php.ini:;suhosin.upload.**disallow_binary = 0
>> php.ini:;suhosin.upload.**remove_binary = 0
>> php.ini:;suhosin.upload.**verification_script =
>> php.ini:;suhosin.session.max_**id_length = 128
>> php.ini:; Undocumented: Controls if suhosin coredumps when the optional
>> suhosin patch
>> php.ini:;suhosin.coredump = Off
>> php.ini:;suhosin.protectkey = 1
>> php.ini:; Controls if suhosin loads in stealth mode when it is not the
>> only
>> php.ini:;suhosin.stealth = 1
>> php.ini:; Controls if suhosin's ini directives are changeable per
>> directory
>> php.ini:;suhosin.perdir = "0"
>>
>>
>>
>>
>>> Ken
>>>
>>>
>>> On Wed, Apr 24, 2013 at 5:06 PM, Jim Lucas <lists@xxxxxxxxx> wrote:
>>>
>>>  On 04/24/2013 02:40 PM, Ken Kixmoeller wrote:
>>>>
>>>>  Thanks so much. Yes, we found that because PHP threw an error that said
>>>>> that explicitly. A bit of research led us to add a line to php.ini to
>>>>> set
>>>>> the "max_input_vars" to a higher level.
>>>>>
>>>>> At first, that appeared to fix it (on the development machine). The
>>>>> appearance is wrong; it is still broken. No errors are being thrown. We
>>>>> are
>>>>> baffled.
>>>>>
>>>>> Ken
>>>>>
>>>>>
>>>> If you have the Suhosin patch installed, it also introduces other limits
>>>> to GET and POST variable counts within PHP.
>>>>
>>>> --
>>>> Jim Lucas
>>>>
>>>> http://www.cmsws.com/
>>>> http://www.cmsws.com/examples/
>>>>
>>>>
>>>
>>
>> --
>> Jim Lucas
>>
>> http://www.cmsws.com/
>> http://www.cmsws.com/examples/
>>
>
>

[Index of Archives]     [PHP Home]     [Apache Users]     [PHP on Windows]     [Kernel Newbies]     [PHP Install]     [PHP Classes]     [Pear]     [Postgresql]     [Postgresql PHP]     [PHP on Windows]     [PHP Database Programming]     [PHP SOAP]

  Powered by Linux