April 28, 2010 at 8:47 pm
Comments posted to this topic are about the item Man in the MIddle
April 29, 2010 at 12:52 am
Hi Steve!
SQL Server include a number of encryption technologies, TDE, SSL and more. And unlike Oracle, which charges for encryption features, these are included in the price of SQL Server.
Yes - but only if you buy Enterprise Edition.
The price Oracle charges for its security pack is high (and the idea is ridiculous, at least to me) - but not quite as high as the price a SQL Server customer with a Standard Edition has to pay to gain access to TDE.
April 29, 2010 at 7:39 am
True, TDE is an EE feature, which I think is a mistake. Many of the other encryption technologies are in all versions.
April 29, 2010 at 7:41 am
Hugo Kornelis (4/29/2010)
Yes - but only if you buy Enterprise Edition.
It should be noted that SSL connection encryption is baked-in to all editions (including Express), which is the key player in preventing man-in-the-middle attacks. 😉
April 29, 2010 at 8:59 am
Sean Terry (4/29/2010)
It should be noted that SSL connection encryption is baked-in to all editions (including Express), which is the key player in preventing man-in-the-middle attacks. 😉
But only if you're using a properly signed cert as stated in the big yellow "Caution" area at http://msdn.microsoft.com/en-us/library/ms189067%28v=SQL.105%29.aspx
Then again, since SSL's been broken (google ssl md5 broken), I don't think it's a panacea for any business at risk of MITM attacks.
Rich
April 29, 2010 at 10:29 am
TDE is a great new feature, but so is backup compression and using TDE essentially nullifies the other out. Try both together and see for yourself, although this is not recommended. Encrypted data compresses significantly less than equivalent unencrypted data. If TDE is used to encrypt a database, backup compression will not be able to significantly compress the backup storage. So, Mickeysoft gaves us two great new features in SQL 2008 we really can't use together. Also, please do keep in mind when using TDE that TEMPDB is automatically encrypted when you enable TDE on any database on a server instance and this can cause performance issues with non-encrypted databases using TEMPDB on that server.:-D
"Technology is a weird thing. It brings you great gifts with one hand, and it stabs you in the back with the other. ...:-D"
April 29, 2010 at 10:36 am
SSL doesn't solve everything, but it does reduce some people making attacks. That's why I mention learning more about other network protocols. Perhaps we ought to also be encrypting at an even lower network level using some sort of secure tunneling for clients of SQL Server.
April 29, 2010 at 1:27 pm
We recently had a vendor demo demonstrating an attack that is just as easy as MITM. Once attached directly to the server, he was able to then display the sa password. Apparently SQL server keeps the SA password in clear text in memory. If somebody logs on with the SA, it will stay there in memory - even after the connection is closed. Combine this with a MITM attack, and you have no data left to protect.
Jason...AKA CirqueDeSQLeil
_______________________________________________
I have given a name to my pain...MCM SQL Server, MVP
SQL RNNR
Posting Performance Based Questions - Gail Shaw[/url]
Learn Extended Events
Viewing 8 posts - 1 through 7 (of 7 total)
You must be logged in to reply to this topic. Login to reply