25.04.2016 17:03, Alex Peshkoff wrote:
> Unlike other methods key in this case is not touched by open source code
> making possibility of stealing it much smaller.
It doesn't matter if engine will decrypt whole database for you after
changing couple
of bytes in header.
Key is pointless, da
On 04/25/2016 03:51 PM, Emil Totev wrote:
>> From: Alex Peshkoff
>> Subject: Re: [Firebird-devel] User password for encryption
>> To: firebird-devel@lists.sourceforge.net
>> Message-ID: <571e0924.3010...@mail.ru>
>> Content-Type: text/plain; charset=windows-125
> From: Alex Peshkoff
> Subject: Re: [Firebird-devel] User password for encryption
> To: firebird-devel@lists.sourceforge.net
> Message-ID: <571e0924.3010...@mail.ru>
> Content-Type: text/plain; charset=windows-1252; format=flowed
>
> On 04/25/2016 11:28 AM, Emil To
On 04/25/2016 11:28 AM, Emil Totev wrote:
> How difficult would it be to get the user password to the encryption /
> key holder plugin, especially for an embedded connection?
I will start from the most simple part - embedded connection. As far as
I understand you ask about password which is used
How difficult would it be to get the user password to the encryption /
key holder plugin, especially for an embedded connection? If possible
at all, would this require new authentication plugin or key holder
plugin or both?
Applications using embedded connections would benefit most from
database