Hello to all. Sorry to have answered this late, I've been out for Thanksgiving.
Wow! I didn't know I knew so little about securing servers. :) Thanks so much to all of you for all your answers. I have to agree. I have always thought that keeping the bad guys out should be done by the people that are best supposed to know about it, the network and security guys. I am just a lowly coder. :) My guess is that the thought behind the password encryption request is really to try and make life a bit more difficult to the less skilled inside hackers (read here their own employees). Not long ago I was told by a security expert that over 90% of hack attacks are insider jobs. I'll pass along a link to this discussion to the person in charge. I hope they realize that the password encryption is not the solution to the problems they're trying to prevent. Many thanks to all of you. Pepe On Nov 27, 1:40 pm, "Jean-Marc (M2i3.com)" <[EMAIL PROTECTED]> wrote: > Funny this would end up on a discussion on Rails. > > We have clients on other products asking to encrypt the passwords and > encrypt this and that (funny also they are gov. bodies too). > > The explanation about securing the server and restricting access to > the file did not resolve the question. > > What did resolve the question was: > > - encryption the information with the private portion of a PPK (public/ > private key). > - use a smartcard installed on the server with the public portion of > the PPK > > This approach does not resolve physical access to the computer but it > does limit the accessibility to the data. It does not resolve the > following: > > 1. the party takes control of the machine where the smartcard is > connected (if you can control the machine it is very likely you can > access the information on the smartcard). > 2. your facility is invaded and the smartcard is stolen. > > -------- > > Personally I think there is way too much attention given to encryption > as a mean to secure stored information... you always need to provide a > mean to retrieve it which makes it insecure if that mean is > compromised. > > My personal preference on that level is to: > > 1. ensure is visible only to users who should see it (can be done with > file/network security... no need for encryption there). > 2. ensure that the file is access only by processes/users who are > authorized to view that information (can be done with monitoring tools > to trigger an alert.... if your machine or file has been compromised > you got bigger problems than a single password in a file). > 3. frequently change the credential information (this will reduce the > value of the information it is compromised) > 4. monitor the services (i.e. database, web, file system, connections) > and look for suspicious activity > > Lastly, it is important to keep in mind that security is a question of > layers... the more you have the better chances you have of not being > compromised... > > Jean-Marchttp://m2i3.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/rubyonrails-talk?hl=en -~----------~----~----~----~------~----~------~--~---

