Re: [GENERAL] When to encrypt

2004-12-11 Thread Chris Travers
Christopher Browne wrote: Why do you think that's useful in limiting vulnerability? In order for the system to mount the filesystem, the key has got to be there. It does not have to be locally on the system. If I wanted to secure such a system, I would have a private key for decrypting the fil

Re: [GENERAL] When to encrypt

2004-12-10 Thread Jan Wieck
On 12/6/2004 6:10 PM, Greg Stark wrote: Martijn van Oosterhout <[EMAIL PROTECTED]> writes: Actually, hard disk encryption is useful for one thing: so if somebody kills the power and takes the hard disk/computer, the data is safe. While it's running it's vulnerable though... Where do you plan to kee

Re: [GENERAL] When to encrypt

2004-12-10 Thread Greg Stark
Daniel Martini <[EMAIL PROTECTED]> writes: > Well, where do you plan to keep the key for your encrypted backup tapes, > like you suggested in another post in this thread ;-) > That's pretty much the same problem. No it's not. I can keep the key for the encrypted backup tapes in my pocket. I won'

Re: [GENERAL] When to encrypt

2004-12-07 Thread Daniel Martini
Hi, Citing Greg Stark <[EMAIL PROTECTED]>: > Martijn van Oosterhout <[EMAIL PROTECTED]> writes: > > Actually, hard disk encryption is useful for one thing: so if somebody > > kills the power and takes the hard disk/computer, the data is safe. > > While it's running it's vulnerable though... > > W

Re: [GENERAL] When to encrypt

2004-12-06 Thread Christopher Browne
Why do you think that's useful in limiting vulnerability? In order for the system to mount the filesystem, the key has got to be there. If it's a "highly available" system, it's not acceptable for the system to have to wait for a sysadmin to type in a decryption key, so the key has to be sitting

Re: [GENERAL] When to encrypt

2004-12-06 Thread Christopher Browne
The world rejoiced as [EMAIL PROTECTED] (Martijn van Oosterhout) wrote: > On Mon, Dec 06, 2004 at 04:07:25PM -0500, Greg Stark wrote: >> By contrast, encryption is useful for non-live data such as >> database backups. This lets you take them off-site and store them >> someplace without worrying ab

Re: [GENERAL] When to encrypt

2004-12-06 Thread Greg Stark
Martijn van Oosterhout <[EMAIL PROTECTED]> writes: > Actually, hard disk encryption is useful for one thing: so if somebody > kills the power and takes the hard disk/computer, the data is safe. > While it's running it's vulnerable though... Where do you plan to keep the key? -- greg -

Re: [GENERAL] When to encrypt

2004-12-06 Thread Martijn van Oosterhout
On Mon, Dec 06, 2004 at 04:07:25PM -0500, Greg Stark wrote: > By contrast, encryption is useful for non-live data such as database backups. > This lets you take them off-site and store them someplace without worrying > about someone walking off with your entire database. Or to discard the tapes > w

Re: [GENERAL] When to encrypt

2004-12-06 Thread Greg Stark
Derek Fountain <[EMAIL PROTECTED]> writes: > On Monday 06 December 2004 12:31, you wrote: > > Derek Fountain <[EMAIL PROTECTED]> writes: > > > If another SQL Injection vulnerability turns up (which it might, given > > > the state of the website code), > > > > You will never see another SQL injecti

Re: [GENERAL] When to encrypt

2004-12-06 Thread Jan Wieck
On 12/6/2004 1:33 AM, Derek Fountain wrote: On Monday 06 December 2004 12:31, you wrote: Derek Fountain <[EMAIL PROTECTED]> writes: > If another SQL Injection vulnerability turns up (which it might, given > the state of the website code), You will never see another SQL injection vulnerability if yo

Re: [GENERAL] When to encrypt

2004-12-06 Thread Daniel Martini
Hi, Citing Derek Fountain <[EMAIL PROTECTED]>: > Indeed, but I'm still interested in the general answer. There is no general answer. Depends on how deep you get into trouble, if the data is compromised. > The server I have been looking at was hopelessly insecure and SQL > injection is only one o

Re: [GENERAL] When to encrypt

2004-12-06 Thread Geoffrey
Greg Stark wrote: Derek Fountain <[EMAIL PROTECTED]> writes: If another SQL Injection vulnerability turns up (which it might, given the state of the website code), You will never see another SQL injection vulnerability if Never say never.. -- Until later, Geoffrey ---(end

Re: [GENERAL] When to encrypt

2004-12-06 Thread Dominic Mitchell
On Sun, Dec 05, 2004 at 11:31:34PM -0500, Greg Stark wrote: > Derek Fountain <[EMAIL PROTECTED]> writes: > > If another SQL Injection vulnerability turns up (which it might, given the > > state of the website code), > > You will never see another SQL injection vulnerability if you simply switch

Re: [GENERAL] When to encrypt

2004-12-06 Thread gnari
From: "Derek Fountain" <[EMAIL PROTECTED]> > [snip discussion about encrypting data] > Indeed, but I'm still interested in the general answer. The server I have been > looking at was hopelessly insecure and SQL injection is only one of its > problems. There were several other ways in! Assume, for

Re: [GENERAL] When to encrypt

2004-12-05 Thread Derek Fountain
On Monday 06 December 2004 12:31, you wrote: > Derek Fountain <[EMAIL PROTECTED]> writes: > > If another SQL Injection vulnerability turns up (which it might, given > > the state of the website code), > > You will never see another SQL injection vulnerability if you simply switch > to always using

Re: [GENERAL] When to encrypt

2004-12-05 Thread Christopher Browne
In the last exciting episode, [EMAIL PROTECTED] (Derek Fountain) wrote: > It seems silly to tell him to encrypt everything, including customer > names and addresses, etc. - I've never heard of DB admin > recommending such action - and it'll have an impact on > performance. So where do I draw the li

Re: [GENERAL] When to encrypt

2004-12-05 Thread Greg Stark
Derek Fountain <[EMAIL PROTECTED]> writes: > If another SQL Injection vulnerability turns up (which it might, given the > state of the website code), You will never see another SQL injection vulnerability if you simply switch to always using prepared queries and placeholders. Make it a rule tha

[GENERAL] When to encrypt

2004-12-05 Thread Derek Fountain
A customer of mine recently asked me to try a penetration test on his website, and I found a nice SQL Injection vulnerability. Using that vuln I was able to wander round his DB at will, viewing customer information, user logins, passwords, the lot. He asked me to make some recommendations, of wh