FAQ

General

What is Snuffleupagus?

Snuffleupagus is a PHP7+ module designed to drastically raise the cost of attacks against websites. This is achieved by killing entire bug classes and providing a powerful virtual-patching system, allowing the administrator to fix specific vulnerabilities without having to touch the PHP code.

Where does the name Snuffleupagus come from?

Aloysius Snuffleupagus, more commonly known as Mr. Snuffleupagus, or Snuffy for short, is one of the characters on Sesame Street, the educational television program for young children.

He was created as a woolly mammoth without tusks or (visible) ears, and has a long thick pointed tail, similar in shape to that of a dinosaur or other reptile. He has long thick brown hair and a trunk, or “snuffle”, that drags along the ground. He is Big Bird’s best friend and has a baby sister named Alice. He also attends “Snufflegarten”.

Wikipedia

Why is Snuffleupagus called Snuffleupagus?

Like PHP’s ElePHPant, we thought that using an elephant as a mascot would be a great idea.

Who are you and why did you write Snuffleupagus?

We’re working for NBS System, a web hosting company (meaning that we’re dealing with PHP code all day long), with a strong focus on security. We do have several layers of hardening (kernel, WAF, IDS, etc), but we had nothing for PHP7.

Nowadays, Snuffleupagus is maintained by Julien (jvoisin) Voisin.

Why not Suhosin?

We’re huge fans of Suhosin, unfortunately:

  • it doesn’t work very well on PHP7
  • it has some oudated features and misses new ones
  • it doesn’t cope very well with our various industrialization needs
  • it has some shortcomings by design

We’re using the disable_function directive, but unfortunately, it doesn’t provide enough usable granularity (guess how many CMSs are using the system function to perform various mandatory maintenance tasks).

This is why we decided to write our own hardening module, in the spirit of Suhosin, with virtual-patching support, as well as other cool new features.

What license is Snuffleupagus released under and why?

Snuffleupagus is licensed under the LGPL was developed by the fine people from NBS System, and is maintained by Julien (jvoisin) Voisin.

We chose the LGPL because we don’t care that much how you’re using Snuffleupagus, but we’d like to force people to make their improvements/contributions available to everyone.

What is the different between SNuffleupaugs and a (WAF) like ModSecurity?

ModSecurity and the other Web Application Firewall (WAF) are working by inspecting the http traffic. Snuffleupagus being a PHP module, is operating directly inside your website’s code, with a lesser overhead, as well as a better understanding of what is currently happening inside your application.

Should I use Snuffleupagus?

Yes.

Even if you’re not using the virtual-patching capabilities, Snuffleupagus comes with various passive features that won’t break your website while killing numerous vulnerabilities.

Please keep in mind that you are not only protecting yourself and your users/customers, but also other people on the internet that might be attacked by your server if it becomes compromised.

How mature is this project?

This project has been floating around since early 2016 and we did the first commit the 28ᵗʰ of December of the same year. We’re currently in an beta phase, finding and fixing as many bugs as possible before declaring it stable.

Are you saying that PHP isn’t secure?

We don’t like PHP’s approach of security; namely (sometimes) adding warnings in the documentation and trusting the developer to not do any mistake, instead of focusing on the root cause and killing the bug class once and for all.

Moreover, it seems that the current attitude toward security in the PHP world is to blame the user instead of acknowledging issues, as stated in their documentation. We do think that a security issue that “requires the use of code or settings known to be insecure” is still a security issue, and should be treated as such.

We don’t have the pretension to state that Snuffleupagus will magically solve all your security issues, but we believe that it might definitely help.

Sounds great, but is it working?

We’ve been using it in production since a couple of years, and it thwarted numerous known and unknown attacks. If you want some evidences, one of the developer published in June 2019 a blogpost showcasing how efficient Snuffleupagus was versus major web vulnerabilities from 2018/2019.

Why should I send you bugs, security issues and patches?

Snuffleupagus is an open-source security software, by reporting (or fixing) bugs, or implementing new features, you are helping others to protect themselves.

We’re also firm believers in the Beerbounty system: we are happy to offer you beers when/if we ever meet if you helped the project in any way. If you don’t like beer, we’re sure that we’ll find something else, don’t worry.

Installation and configuration

Can snuffleupagus break my application?

Yes.

Some options won’t break anything, like harden-rand, but some like global_strict or overly-restrictive virtual-patching rules might pretty well break your website. It’s up to you to configure Snuffleupagus accordingly to your needs.

You can also enable the simulation mode on features that you’re not sure about, to see what snuffleupagus would do to your application, before activating them for good.

How can I find out the problem when my application breaks?

By checking the logs; Snuffleupagus systematically prefix them with [snuffleupagus].

Does Snuffleupagus run on Windows?

No idea, feel free to try.

Does Snuggleupagus run on HHVM?

No it doesn’t, since HHVM’s API is really different from PHP7’s one. We’re not currently planning to rewrite Snuffleupagus to support it.

Will Snuffleupagus run on my old PHP 5?

No.

Since PHP5 will be deprecated at the end of 2018, you should think about moving to PHP7 anyway. You can (and should) use Suhosin in the meantime.

Help and support

I found a security issue

If you believe you have found a security issue affecting Snuffleupagus, then we would be more than happy to hear from you!

We promise to treat any reported issue seriously and, if the investigation confirms it affects Snuffleupagus, to patch it within a reasonable time, release a public announcement that describes the issue, discuss potential impact of the vulnerability, reference applicable patches or workarounds, and credit the discoverer.

Please do send a mail to [Julien (jvoisin) Voisin](https://dustri.org) should you find a security issue.

I found a bug. How can I report it?

We do have an issue tracker on Github. Please make sure to include as much information as possible when reporting your issue, such as your operating system, your version of PHP 7, your version of Snuffleupagus, your logs, the problematic php code, the request, a brief description, … long story short, give us everything that you can.

If you’re feeling extra-nice, you can try to debug it yourself, it’s not that hard.

Where can I find even more help?

The configuration page might be what you’re looking for. If you’re adventurous, you can also check the issue tracker (make sure to check the closed issues too).

Unimplemented mitigations and abandoned ideas

Constant time comparisons

We didn’t manage to perform time-based side-channel attacks on strings against real world PHP application, and the results that we gathered on tailored test cases weren’t concluding: for simplicity’s sake, we chose to not implement a mitigation against this class of attacks.

We would be happy to be proven wrong, and reconsider implementing this feature, if someone can manage to get better results than us.

The possibility of having this natively in PHP has been discussed, but as 2017, nothing has been merged yet.