Following from a very successful 1st PHP Conference in Cape Town, we are now breaking ground for Johannesburg`s inaugural conference. Johannesburg will be host to Africa`s Biggest PHP Conference on the continent April 4th&5th 2014. With over 200 delegates attending, the two day event is hosting some of the Continents most influential people in their field. With delegates flying in from as far afield as Ethiopia, Nigeria, Kenya and ROW.

Call for Papers : Closes 30th Novermber 2013

Our event will run over 2 days, come join us for a few days of sharing, networking, learning and some fun. What will make this Conference very special is our Keynote Speaker - For PHPJohannesburg we have Rasmus Lerdorf who will be opening Africa`s Biggest PHP Conference.

We look forward to seeing you. www.phpsouthafrica.com

The PHP development team announces the immediate availability of PHP 5.5.6. This release fixes some bugs against PHP 5.5.5, and adds some performance improvements.

For source downloads of PHP 5.5.6 please visit our downloads page, Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.

The PHP development team announces the immediate availability of PHP 5.5.6. This release fixes some bugs against PHP 5.5.5, and adds some performance improvements.

For source downloads of PHP 5.5.6 please visit our downloads page, Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.

Source

We are continuing to work through the repercussions of the php.net malware issue described in a news post earlier today. As part of this, the php.net systems team have audited every server operated by php.net, and have found that two servers were compromised: the server which hosted the www.php.net, static.php.net and git.php.net domains, and was previously suspected based on the JavaScript malware, and the server hosting bugs.php.net. The method by which these servers were compromised is unknown at this time.

All affected services have been migrated off those servers. We have verified that our Git repository was not compromised, and it remains in read only mode as services are brought back up in full.

As it's possible that the attackers may have accessed the private key of the php.net SSL certificate, we have revoked it immediately. We are in the process of getting a new certificate, and expect to restore access to php.net sites that require SSL (including bugs.php.net and wiki.php.net) in the next few hours.

To summarise, the situation right now is that:

  • JavaScript malware was served to a small percentage of php.net users from the 22nd to the 24th of October 2013.
  • Neither the source tarball downloads nor the Git repository were modified or compromised.
  • Two php.net servers were compromised, and have been removed from service. All services have been migrated to new, secure servers.
  • SSL access to php.net Web sites is temporarily unavailable until a new SSL certificate is issued and installed on the servers that need it.

Over the next few days, we will be taking further action:

  • php.net users will have their passwords reset. Note that users of PHP are unaffected by this: this is solely for people committing code to projects hosted on svn.php.net or git.php.net.

We will provide a full post mortem in due course, most likely next week. You can also get updates from the official php.net Twitter: @official_php.

On 24 Oct 2013 06:15:39 +0000 Google started saying www.php.net was hosting malware. The Google Webmaster Tools were initially quite delayed in showing the reason why and when they did it looked a lot like a false positive because we had some minified/obfuscated javascript being dynamically injected into userprefs.js. This looked suspicious to us as well, but it was actually written to do exactly that so we were quite certain it was a false positive, but we kept digging.

It turned out that by combing through the access logs for static.php.net it was periodically serving up userprefs.js with the wrong content length and then reverting back to the right size after a few minutes. This is due to an rsync cron job. So the file was being modified locally and reverted. Google's crawler caught one of these small windows where the wrong file was being served, but of course, when we looked at it manually it looked fine. So more confusion.

We are still investigating how someone caused that file to be changed, but in the meantime we have migrated www/static to new clean servers. The highest priority is obviously the source code integrity and after a quick:

git fsck --no-reflog --full --strict

on all our repos plus manually checking the md5sums of the PHP distribution files we see no evidence that the PHP code has been compromised. We have a mirror of our git repos on github.com and we will manually check git commits as well and have a full post-mortem on the intrusion when we have a clearer picture of what happened.

The PHP development team announces the immediate availability of PHP 5.4.21. About 10 bugs were fixed. All PHP 5.4 users are encouraged to upgrade to this version.

For source downloads of PHP 5.4.21 please visit our downloads page, Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.

The PHP development team announces the immediate availability of PHP 5.5.5. This release fixes about twenty bugs against PHP 5.5.4, some of them regarding the build system. All PHP users are encouraged to upgrade to this new version.

For source downloads of PHP 5.5.5 please visit our downloads page, Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.

The PHP development team announces the immediate availability of PHP 5.5.5. This release fixes about twenty bugs against PHP 5.5.4, some of them regarding the build system. All PHP users are encouraged to upgrade to this new version.

For source downloads of PHP 5.5.5 please visit our downloads page, Windows binaries can be found on windows.php.net/download/. The list of changes is recorded in the ChangeLog.

Source

Ski PHP 2014 has announced the schedule for their upcoming conference, which will be on January 17-18, 2014 in Salt Lake City, Utah, USA. Our schedule is anchored by keynotes from Jared Smith, Laura Thomson, and Chris Hartjes, and also includes talks from Julien Pauli, Ed Finkler, John Coggeshall, Elizabeth Naramore, and many more.

Our Early Bird registration rate of just $129 is available until October 15th. Hotel group rate information is available at our site.

November 16th, 2013 - 8:30am - 3:30pm
Warner Park Community Recreation Center
1625 Northport Dr, Madison, WI 53704
$40 (before October 16th), $60 (after October 16th), $100 at the door

Call for Papers: Now through October 8th, 2013

Join us for a one day, two-track conference that focuses on PHP and related web technologies. This event is organized by Madison PHP and is designed to offer something to attendees at all skill levels. It will be a day of networking, learning, sharing, and great fun!

Two Tracks We've carefully crafted two distinct tracks but you're not locked into just one. Attend any talk from any track.

PHP Foundations Track Learn the basics of PHP development. A carefully selected set of talks for those who have never programmed before or who are new to PHP and would like a refresher of the basics.

PHP Professional Track Explore new technologies and techniques. Gather with other seasoned developers and increase your value with a series of talks that will both energize and get you excited about the future of PHP.

For more information and to register, please visit: http://www.MadisonPHPConference.com