Re: When to encrypt

From: Derek Fountain <dflists(at)iinet(dot)net(dot)au>
To: pgsql-general(at)postgresql(dot)org
Subject: Re: When to encrypt
Date: 2004-12-06 06:33:31
Message-ID: 200412061433.31724.dflists@iinet.net.au
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

On Monday 06 December 2004 12:31, you wrote:
> Derek Fountain <dflists(at)iinet(dot)net(dot)au> writes:
> > If another SQL Injection vulnerability turns up (which it might, given
> > the state of the website code),
>
> You will never see another SQL injection vulnerability if you simply switch
> to always using prepared queries and placeholders.

<much wisdom snipped>

Indeed, but I'm still interested in the general answer. The server I have been
looking at was hopelessly insecure and SQL injection is only one of its
problems. There were several other ways in! Assume, for example, an attacker
can write his own script directly into the website document tree. In this
case prepared queries don't help protect what's in the database. The attacker
can use them himself if he likes!

Given this type of mess, having logins, passwords, credit card info and the
like encrypted in the DB will add another layer of protection. The question
is, do people normally add this layer, just in case, or do they assume that
all the previous layers will do the job?

Personally I've never encrypted data in this way, but for this guy there does
seem to be a requirement.

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Michael Fuhr 2004-12-06 06:37:17 Re: [HACKERS] DBD::PgSPI 0.02
Previous Message alex 2004-12-06 05:27:18 DBD::PgSPI 0.02