Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Geoff Caplan

Mike,

Does anyone have any suggested method of scrambling a user's credit card
number before I stick it in a mysql database?

With respect, if you have to ask the question, you don't have the
technical skills to do this safely. In particular, there is no way to
keep the numbers secure if you are storing them on a machine which can
be accessed directly from the internet. Both your encryption keys and
your card numbers would have to be stored on a back-end machine
protected by a sophisticated firewall.

Payment gateway providers have to meet challenging standards and
undergo rigorous audits from the banks before they are allowed to
store numbers. Much your best solution is to use one of these
providers, who will store the card numbers for you. You can then do
all the transactions you require, such as repeats, refunds etc without
ever having to store the card number. Many providers offer the options
of using forms on their servers, or using your own SSL forms and
posting them the data using the SSL. With the CURL library, writing an
interface for this is relatively trivial.

Many countries (such as the UK where we operate) have laws about the
storage of credit cards on computer networks, so what you are planning
may even be illegal!

-- 
Geoff Caplan
Advantae Ltd

mailto:[EMAIL PROTECTED]
http://www.advantae.com


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




RE: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread César Aracena

Mike,

I agree with the things that Geoff is telling you. What I have seen in
the past and even in some free PHP programs that I downloaded for
learning purposes, is the CC number stored in your database but not
entirely. I mean like 1234789 so the customer can verify that
the transaction will be made using the right CC and not an old one or
even someone else CC.

HTH, C.

 -Original Message-
 From: Geoff Caplan [mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, August 13, 2002 5:20 AM
 To: Mike Mannakee; [EMAIL PROTECTED]
 Subject: Re[2]: [PHP] Credit Card suggestions
 
 Mike,
 
 Does anyone have any suggested method of scrambling a user's credit
card
 number before I stick it in a mysql database?
 
 With respect, if you have to ask the question, you don't have the
 technical skills to do this safely. In particular, there is no way to
 keep the numbers secure if you are storing them on a machine which can
 be accessed directly from the internet. Both your encryption keys and
 your card numbers would have to be stored on a back-end machine
 protected by a sophisticated firewall.
 
 Payment gateway providers have to meet challenging standards and
 undergo rigorous audits from the banks before they are allowed to
 store numbers. Much your best solution is to use one of these
 providers, who will store the card numbers for you. You can then do
 all the transactions you require, such as repeats, refunds etc without
 ever having to store the card number. Many providers offer the options
 of using forms on their servers, or using your own SSL forms and
 posting them the data using the SSL. With the CURL library, writing an
 interface for this is relatively trivial.
 
 Many countries (such as the UK where we operate) have laws about the
 storage of credit cards on computer networks, so what you are planning
 may even be illegal!
 
 --
 Geoff Caplan
 Advantae Ltd
 
 mailto:[EMAIL PROTECTED]
 http://www.advantae.com
 
 
 --
 PHP General Mailing List (http://www.php.net/)
 To unsubscribe, visit: http://www.php.net/unsub.php



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




AW: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Sascha Braun

If there is no secure way to store creditcards on webservers, please tell me
about how secure it is to encrypt passwords with md5 encryption.

I want a password secured area in my website where I store some company
concepts I invented. I'm searching for people who got enough money to make
these concepts happen in true life, but I don't want these people to look at
the concepts before I don't have there Personal Data.

If someone is interestet and German speaking you may look at
www.weitsicht.org, but the site isn't finished yet. some things don't work
on other browsers than IE.

Thanks

Schura



-Ursprungliche Nachricht-
Von: Geoff Caplan [mailto:[EMAIL PROTECTED]]
Gesendet: Dienstag, 13. August 2002 10:20
An: Mike Mannakee; [EMAIL PROTECTED]
Betreff: Re[2]: [PHP] Credit Card suggestions


Mike,

Does anyone have any suggested method of scrambling a user's credit card
number before I stick it in a mysql database?

With respect, if you have to ask the question, you don't have the
technical skills to do this safely. In particular, there is no way to
keep the numbers secure if you are storing them on a machine which can
be accessed directly from the internet. Both your encryption keys and
your card numbers would have to be stored on a back-end machine
protected by a sophisticated firewall.

Payment gateway providers have to meet challenging standards and
undergo rigorous audits from the banks before they are allowed to
store numbers. Much your best solution is to use one of these
providers, who will store the card numbers for you. You can then do
all the transactions you require, such as repeats, refunds etc without
ever having to store the card number. Many providers offer the options
of using forms on their servers, or using your own SSL forms and
posting them the data using the SSL. With the CURL library, writing an
interface for this is relatively trivial.

Many countries (such as the UK where we operate) have laws about the
storage of credit cards on computer networks, so what you are planning
may even be illegal!

--
Geoff Caplan
Advantae Ltd

mailto:[EMAIL PROTECTED]
http://www.advantae.com


--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Jim Dam

MD5 encryption of passwords is secure since you do not need to decrypt the
password ever (in fact you can't).  You just encrypt the password that the
user entered and check if the MD5 of each password is the same, then the
user most likely entered the correct password.

- Original Message -
From: Sascha Braun [EMAIL PROTECTED]
To: PHP Mailingliste [EMAIL PROTECTED]
Sent: Tuesday, August 13, 2002 10:52 AM
Subject: AW: Re[2]: [PHP] Credit Card suggestions


 If there is no secure way to store creditcards on webservers, please tell
me
 about how secure it is to encrypt passwords with md5 encryption.

 I want a password secured area in my website where I store some company
 concepts I invented. I'm searching for people who got enough money to make
 these concepts happen in true life, but I don't want these people to look
at
 the concepts before I don't have there Personal Data.

 If someone is interestet and German speaking you may look at
 www.weitsicht.org, but the site isn't finished yet. some things don't work
 on other browsers than IE.

 Thanks

 Schura



 -Ursprungliche Nachricht-
 Von: Geoff Caplan [mailto:[EMAIL PROTECTED]]
 Gesendet: Dienstag, 13. August 2002 10:20
 An: Mike Mannakee; [EMAIL PROTECTED]
 Betreff: Re[2]: [PHP] Credit Card suggestions


 Mike,

 Does anyone have any suggested method of scrambling a user's credit card
 number before I stick it in a mysql database?

 With respect, if you have to ask the question, you don't have the
 technical skills to do this safely. In particular, there is no way to
 keep the numbers secure if you are storing them on a machine which can
 be accessed directly from the internet. Both your encryption keys and
 your card numbers would have to be stored on a back-end machine
 protected by a sophisticated firewall.

 Payment gateway providers have to meet challenging standards and
 undergo rigorous audits from the banks before they are allowed to
 store numbers. Much your best solution is to use one of these
 providers, who will store the card numbers for you. You can then do
 all the transactions you require, such as repeats, refunds etc without
 ever having to store the card number. Many providers offer the options
 of using forms on their servers, or using your own SSL forms and
 posting them the data using the SSL. With the CURL library, writing an
 interface for this is relatively trivial.

 Many countries (such as the UK where we operate) have laws about the
 storage of credit cards on computer networks, so what you are planning
 may even be illegal!

 --
 Geoff Caplan
 Advantae Ltd

 mailto:[EMAIL PROTECTED]
 http://www.advantae.com


 --
 PHP General Mailing List (http://www.php.net/)
 To unsubscribe, visit: http://www.php.net/unsub.php


 --
 PHP General Mailing List (http://www.php.net/)
 To unsubscribe, visit: http://www.php.net/unsub.php



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Robert Parker

On Tuesday 13 August 2002 10:57 am, you wrote:
 MD5 encryption of passwords is secure since you do not need to decrypt the
 password ever (in fact you can't).  You just encrypt the password that the
 user entered and check if the MD5 of each password is the same, then the
 user most likely entered the correct password.

I don't remember where I read this but it only takes the crackers about 1 - 2 
seconds to crack your average MD5 encrypted password. This is quite logical
because all they had to do is make a database of all of the MD5 sums of all 
the passwords in the various dictionaries.
The only Linux distro in my (limited) experience that gave the option of MD5 
encryption of passwords was Debian 2. Even then you had the option of shadow 
password files instead. Debian 2 is quite old. Later distros such as Mandrake 
8.0 and up simply use shadow password files without other option.

Regards
Bob Parker

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Adam Voigt

Makes sense, except if you use upper and lowercase characters,
numbers, and symbols (as you should for secure passwords). I
would think that with these kind of passwords, storing the sheer
number of posibilites would get slightly large. And I mean even
if it is easy to break, it's more secure then storing them clear
text.

Adam Voigt
[EMAIL PROTECTED]

On Wed, 2002-08-14 at 02:20, Robert Parker wrote:
 On Tuesday 13 August 2002 10:57 am, you wrote:
  MD5 encryption of passwords is secure since you do not need to decrypt the
  password ever (in fact you can't).  You just encrypt the password that the
  user entered and check if the MD5 of each password is the same, then the
  user most likely entered the correct password.
 
 I don't remember where I read this but it only takes the crackers about 1 - 2 
 seconds to crack your average MD5 encrypted password. This is quite logical
 because all they had to do is make a database of all of the MD5 sums of all 
 the passwords in the various dictionaries.
 The only Linux distro in my (limited) experience that gave the option of MD5 
 encryption of passwords was Debian 2. Even then you had the option of shadow 
 password files instead. Debian 2 is quite old. Later distros such as Mandrake 
 8.0 and up simply use shadow password files without other option.
 
 Regards
 Bob Parker
 
 -- 
 PHP General Mailing List (http://www.php.net/)
 To unsubscribe, visit: http://www.php.net/unsub.php
 



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Robert Parker

On Tuesday 13 August 2002 12:20 pm, you wrote:
 Makes sense, except if you use upper and lowercase characters,
 numbers, and symbols (as you should for secure passwords). I
 would think that with these kind of passwords, storing the sheer
 number of posibilites would get slightly large. And I mean even
 if it is easy to break, it's more secure then storing them clear
 text.

 Adam Voigt
 [EMAIL PROTECTED]

Thing that really scares me about MD5 being used anywhere that's easily
accessible is what happens if 'pussycat' maps on to the same hash as 
'H3ph!3s09Zw'. The crackers don't need the original password just something 
that generates the same hash.

Bob Parker

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Adam Voigt

If I could find the link I would send it, but I read about 6 months
back on RSA Data Security's website that a study was being done by
mathemetician's and at the time they were theorizing that they highly
doubted any overlap in keysums but if such did exist they believed that
the key you would have to MD5 to get the same sum would have to be
several chapters worth of characters. Point of the story is, it's
highly, highly, highly unlikely.

Adam Voigt
[EMAIL PROTECTED]

On Wed, 2002-08-14 at 02:36, Robert Parker wrote:
 On Tuesday 13 August 2002 12:20 pm, you wrote:
  Makes sense, except if you use upper and lowercase characters,
  numbers, and symbols (as you should for secure passwords). I
  would think that with these kind of passwords, storing the sheer
  number of posibilites would get slightly large. And I mean even
  if it is easy to break, it's more secure then storing them clear
  text.
 
  Adam Voigt
  [EMAIL PROTECTED]
 
 Thing that really scares me about MD5 being used anywhere that's easily
 accessible is what happens if 'pussycat' maps on to the same hash as 
 'H3ph!3s09Zw'. The crackers don't need the original password just something 
 that generates the same hash.
 
 Bob Parker



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread John S. Huggins

On Wed, 14 Aug 2002, Robert Parker wrote:

-On Tuesday 13 August 2002 12:20 pm, you wrote:
- Makes sense, except if you use upper and lowercase characters,
- numbers, and symbols (as you should for secure passwords). I
- would think that with these kind of passwords, storing the sheer
- number of posibilites would get slightly large. And I mean even
- if it is easy to break, it's more secure then storing them clear
- text.
-
- Adam Voigt
- [EMAIL PROTECTED]
-
-Thing that really scares me about MD5 being used anywhere that's easily
-accessible is what happens if 'pussycat' maps on to the same hash as 
-'H3ph!3s09Zw'. The crackers don't need the original password just something 
-that generates the same hash.

Sure this is possible and I agree a concern.  With MD5 there is some
mathematically small chance this will happen.  With SHA even smaller.
However, where do we draw the line?

I suppose requiring users to use long passphrases instead of passwords and
MD5 that result would help with this issue.

-
-Bob Parker
-
--- 
-PHP General Mailing List (http://www.php.net/)
-To unsubscribe, visit: http://www.php.net/unsub.php
-

**

John Huggins
VANet

[EMAIL PROTECTED]
http://www.va.net/

**


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Adam Voigt

True, and there's always the MCRYPT library.

Adam Voigt
[EMAIL PROTECTED]

On Tue, 2002-08-13 at 12:48, John S. Huggins wrote:
 On Wed, 14 Aug 2002, Robert Parker wrote:
 
 -On Tuesday 13 August 2002 12:20 pm, you wrote:
 - Makes sense, except if you use upper and lowercase characters,
 - numbers, and symbols (as you should for secure passwords). I
 - would think that with these kind of passwords, storing the sheer
 - number of posibilites would get slightly large. And I mean even
 - if it is easy to break, it's more secure then storing them clear
 - text.
 -
 - Adam Voigt
 - [EMAIL PROTECTED]
 -
 -Thing that really scares me about MD5 being used anywhere that's easily
 -accessible is what happens if 'pussycat' maps on to the same hash as 
 -'H3ph!3s09Zw'. The crackers don't need the original password just something 
 -that generates the same hash.
 
 Sure this is possible and I agree a concern.  With MD5 there is some
 mathematically small chance this will happen.  With SHA even smaller.
 However, where do we draw the line?
 
 I suppose requiring users to use long passphrases instead of passwords and
 MD5 that result would help with this issue.
 
 -
 -Bob Parker
 -
 --- 
 -PHP General Mailing List (http://www.php.net/)
 -To unsubscribe, visit: http://www.php.net/unsub.php
 -
 
 **
 
 John Huggins
 VANet
 
 [EMAIL PROTECTED]
 http://www.va.net/
 
 **
 



-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




RE: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Richard Black

Doesn't md5 generate a 128 bit binary number???

That means there are 3.4028236692093846346337460743177e+38 possible
combinations which can be generated. So surely the odds of 2 strings
producing the same md5 code are 1 in
3.4028236692093846346337460743177e+38???

Having said that, I guess dictionary based attacks could break in fairly
easily. That's why I always make my users have numbers and mixed case in
their passwords. 

-Original Message-
From: John S. Huggins [mailto:[EMAIL PROTECTED]] 
Sent: 13 August 2002 17:48
To: Robert Parker
Cc: [EMAIL PROTECTED]; Adam Voigt
Subject: Re: Re[2]: [PHP] Credit Card suggestions


On Wed, 14 Aug 2002, Robert Parker wrote:

-On Tuesday 13 August 2002 12:20 pm, you wrote:
- Makes sense, except if you use upper and lowercase characters, 
- numbers, and symbols (as you should for secure passwords). I would 
- think that with these kind of passwords, storing the sheer number of

- posibilites would get slightly large. And I mean even if it is easy 
- to break, it's more secure then storing them clear text.
-
- Adam Voigt
- [EMAIL PROTECTED]
-
-Thing that really scares me about MD5 being used anywhere that's 
easily -accessible is what happens if 'pussycat' maps on to the same 
hash as -'H3ph!3s09Zw'. The crackers don't need the original password 
just something -that generates the same hash.

Sure this is possible and I agree a concern.  With MD5 there is some
mathematically small chance this will happen.  With SHA even smaller.
However, where do we draw the line?

I suppose requiring users to use long passphrases instead of passwords
and MD5 that result would help with this issue.

-
-Bob Parker
-
---
-PHP General Mailing List (http://www.php.net/)
-To unsubscribe, visit: http://www.php.net/unsub.php
-

**

John Huggins
VANet

[EMAIL PROTECTED]
http://www.va.net/

**


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread John S. Huggins

On Wed, 14 Aug 2002, Robert Parker wrote:

-On Tuesday 13 August 2002 12:20 pm, you wrote:
- Makes sense, except if you use upper and lowercase characters,
- numbers, and symbols (as you should for secure passwords). I
- would think that with these kind of passwords, storing the sheer
- number of posibilites would get slightly large. And I mean even
- if it is easy to break, it's more secure then storing them clear
- text.
-
- Adam Voigt
- [EMAIL PROTECTED]
-
-Thing that really scares me about MD5 being used anywhere that's easily
-accessible is what happens if 'pussycat' maps on to the same hash as 
-'H3ph!3s09Zw'. The crackers don't need the original password just something 
-that generates the same hash.
-
-Bob Parker

Whoa, I thought Bob was saying he found two strings that generate the same
hash.

md5(pussycat) = fd316a211a7178c6fbf09c4c2ac6fa05
md5(H3ph!3s09Zw) = 4172a5caff5b7878144c8aae11f3de17

Guess not.  WHEW!




**

John Huggins
VANet

[EMAIL PROTECTED]
http://www.va.net/

**


-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php




Re: Re[2]: [PHP] Credit Card suggestions

2002-08-13 Thread Analysis Solutions

On Wed, Aug 14, 2002 at 02:20:07AM -0400, Robert Parker wrote:

 I don't remember where I read this but it only takes the crackers about 1 - 2 
 seconds to crack your average MD5 encrypted password. This is quite logical
 because all they had to do is make a database of all of the MD5 sums of all 
 the passwords in the various dictionaries.

Of course, that would necessitate access to the machine.  A brute force
dictionary attack is much more likely.  To thwart both, enforce strong
passwords.

--Dan

-- 
   PHP classes that make web design easier
SQL Solution  |   Layout Solution   |  Form Solution
sqlsolution.info  | layoutsolution.info |  formsolution.info
 T H E   A N A L Y S I S   A N D   S O L U T I O N S   C O M P A N Y
 4015 7 Av #4AJ, Brooklyn NY v: 718-854-0335 f: 718-854-0409

-- 
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php