Subject | Re: [IB-Architect] Fw: Mischievous SYSDBA |
---|---|
Author | Steve Tendon |
Post date | 2000-05-25T21:04:35Z |
> Given the code, it would be next to trivial to pass in an encryptionOK.
> key in the database parameter block used in the block read/write
> routines to encrypt the database.
> Perhaps a VAR might want to doThe argument that encryption will take CPU cycles is just a cost/benefit
> that, even given the cpu hit that it's going to cost him.
issue for the developers/users involved. If they want the functionality,
they have to pay. It shouldn't be a basis for deciding whether or not the
functionality should be supported.
> If theYes, that's the VAR's decision.
> VAR makes the change to a private code base and distributes only
> the binaries, he's got a fighting chance that obscurity will prevail
> and his database will be secure from prying eyes (and third party
> tools, of course).
>Yes, I can see the problem, and agree that the mainline code base shouldn't
> A different question is whether the mainline codebase would support
> that functionality. I would argue that it shouldn't for severals
> reasons. First, on a theoretical basis, it's a joke. Second, on
> a practical basis, a day after the feature is introduced, somebody
> will publish a key retrieval hack to renders the feature completely
> useless.
do that part of the dirty work.
> Security features should be theoretically sound so all we have toDon't get me wrong: I'm not advocating "security-thru-obscurity". However, I
> worry about is the implementation and administration (which is hard
> enough). I don't think we should kit ourselves that additional
> obscurity is going to help.
still don't feel we're getting any closer to a solution.
-ST