> 1. If your properly encrypting the url your going to change your seed
> (key)
>  every request.��That way it is different every time
>
That is a good way to disclose your encryption algorithm, so this
practices provides no security.

>  2. By using plain text variable names your going to give the potential
>  intruder a decent insight into your application design, and this will
> give
>  them the ability to make educated guesses as to your other circuit
> names.
>
The old security through obscurity argument, which has been shown time
and time again to provide no real protection.

>  3. The objection to using cfquery is multifaceted.��There is the risk
> of SQL
>  injection if your not doing the correct validation.��If your errors
> are not
>  being handled correctly you can give away table and column names in
> the
>  error message.��Also should someone gain access to your file system
> they can
>  build a pretty complete picture of your database from the
> queries.��You
>  can't do this when all you are using is Stored Procedures, especially
> if
>  your variable names don't match your column names.��Throw in views
> and you
>  can obscure it even more.
>
I am still waiting for the object to using cfquery. All of the issues
you mentioned only apply to certain uses of cfquery, which is quite a
bit different than all uses.

-Matt
[Todays Threads] [This Message] [Subscription] [Fast Unsubscribe] [User Settings]

Reply via email to