--- mock <[EMAIL PROTECTED]> wrote:

> On Tue, Aug 10, 2004 at 08:57:14PM -0400, Geoffrey
> Young wrote:
> > 
> > >>but hiding the decryption key from technical
> people is generally
> > >>impossible
> > > 
> > > 
> > > Only if they crack your application server. 
> Cracking the database or
> > > sniffing packets would not be good enough,
> assuming traffic to your
> > > credit card company is over SSL.
> > 
> > oh, sure.
> > 
> > I guess I had a different mindset with all of that
> - internal employees.
> > for most big companies I would assume that
> accessing the underlying Oracle
> > financials database (or some other "enterprise"
> solution) with _all_ the
> > credit card numbers would be sufficiently
> difficult for outside hackers.
> > I'd be much more worried about the disgruntled
> employee causing trouble.
> > 
> > but you're right - crackers are a legitimate
> concern for this kind of thing,
> > and I wasn't aware of the role that verisign is
> now playing (which I guess
> > is the cost of having worked someplace where we
> built everything from
> > scratch).  so, thanks for the knowledge :)
> > 
> > --Geoff
> > 
> > -- 
> > Report problems: http://perl.apache.org/bugs/
> > Mail list info:
> http://perl.apache.org/maillist/modperl.html
> > List etiquette:
> http://perl.apache.org/maillist/email-etiquette.html
> > 
> 
> This is about to go out to CPAN, but since it seems
> there is some question
> as to how to do this, I'll send it out a little
> early.  Attached is a module
> for safely encrypting and storing credit cards using
> the Business::OnlinePayment
> interface.  It uses a public RSA key and
> Crypt::OpenSSL::RSA to encrypt a 
> randomly generated Blowfish symetric key, which is
> used with Crypt::CBC to
> encrypt the creditcard details.  Also included is a
> module for reversing the
> transaction given the RSA private key.  This allows
> one to store creditcards
> safely on the server, by not putting the private RSA
> key on the same machine.
> To retrieve the cards, simply pull the data to an
> offline machine, and 
> decrypt using the RSA private key.  Assuming you
> aren't an idiot and leave
> the private key somewhere internet accessible, this
> should be as proof against
> hackers as any other credit card processing.
> 
> enjoy
> 
> mock
> 

This sounds really awesome. Thanks. just what we need.

Can one key decrypt the whole batch of cards?


> ATTACHMENT part 2 application/x-tar-gz 
> -- 
> Report problems: http://perl.apache.org/bugs/
> Mail list info:
> http://perl.apache.org/maillist/modperl.html
> List etiquette:
http://perl.apache.org/maillist/email-etiquette.html



                
__________________________________
Do you Yahoo!?
Yahoo! Mail is new and improved - Check it out!
http://promotions.yahoo.com/new_mail

-- 
Report problems: http://perl.apache.org/bugs/
Mail list info: http://perl.apache.org/maillist/modperl.html
List etiquette: http://perl.apache.org/maillist/email-etiquette.html

Reply via email to