August 6, 2018 at 8:45 am
autoexcrement - Monday, August 6, 2018 8:23 AMI still just don't fully understand how salts and the like are supposedly so helpful, because it seems like they have to be stored somewhere. Either in code or in an environment variable or somewhere. Why is there an assumption that that's safe when a database isn't?
"Properly salted" simply makes things like the use of rainbow tables and other brute force decryption techniques a whole lot more difficult. But, along with "properly salted", you must do proper encryption, which means that if someone manages to get a copy of the database, they not only have to deal with "properly salted" but they also have to deal with the fact that the encryption key(s) don't travel with the database.
--Jeff Moden
Change is inevitable... Change for the better is not.
August 6, 2018 at 8:46 am
ScottPletcher - Monday, August 6, 2018 8:14 AMJeff Moden - Monday, August 6, 2018 8:00 AMScottPletcher - Monday, August 6, 2018 7:43 AMFor storing of SSN, you might consider adding a check digit to the value, so that it does become 10 digits (or 11 or whatever). That way they are trying to hack into the wrong number of digits, which should slow down the process a bit at least.If it's stored that way in plain text, a hacker will eat that up in less than a second. The only right way to protect such things is with properly salted encryption.
Not talking about plain text, but encrypting a value with extra digit(s) added. Could even add random digits in fixed locations, just to make it harder for someone to know how many digits they were trying to hack.
What's the difference between that and using "proper salting"?
--Jeff Moden
Change is inevitable... Change for the better is not.
August 6, 2018 at 8:58 am
Jeff Moden - Monday, August 6, 2018 8:46 AMScottPletcher - Monday, August 6, 2018 8:14 AMJeff Moden - Monday, August 6, 2018 8:00 AMScottPletcher - Monday, August 6, 2018 7:43 AMFor storing of SSN, you might consider adding a check digit to the value, so that it does become 10 digits (or 11 or whatever). That way they are trying to hack into the wrong number of digits, which should slow down the process a bit at least.If it's stored that way in plain text, a hacker will eat that up in less than a second. The only right way to protect such things is with properly salted encryption.
Not talking about plain text, but encrypting a value with extra digit(s) added. Could even add random digits in fixed locations, just to make it harder for someone to know how many digits they were trying to hack.
What's the difference between that and using "proper salting"?
That's what is called obfuscation, no substitute for security, especially when there are known checksum algorithms to validate the numbers. May add a slight overhead but nothing that comes close to good encryption with a salt / private key.
😎
There are many cases where businesses have relied on such measures and utterly failed.
August 6, 2018 at 9:52 am
Eirikur Eiriksson - Monday, August 6, 2018 8:58 AMJeff Moden - Monday, August 6, 2018 8:46 AMScottPletcher - Monday, August 6, 2018 8:14 AMJeff Moden - Monday, August 6, 2018 8:00 AMScottPletcher - Monday, August 6, 2018 7:43 AMFor storing of SSN, you might consider adding a check digit to the value, so that it does become 10 digits (or 11 or whatever). That way they are trying to hack into the wrong number of digits, which should slow down the process a bit at least.If it's stored that way in plain text, a hacker will eat that up in less than a second. The only right way to protect such things is with properly salted encryption.
Not talking about plain text, but encrypting a value with extra digit(s) added. Could even add random digits in fixed locations, just to make it harder for someone to know how many digits they were trying to hack.
What's the difference between that and using "proper salting"?
That's what is called obfuscation, no substitute for security, especially when there are known checksum algorithms to validate the numbers. May add a slight overhead but nothing that comes close to good encryption with a salt / private key.
😎There are many cases where businesses have relied on such measures and utterly failed.
Heh... you took the fun out of it. My question was a "leader" to try to get people to understand that very thing. 😀 That IS, however, the response that I was trying to get folks to come up with though so, as has been the norm since I've known you, spot on Eirikur.
--Jeff Moden
Change is inevitable... Change for the better is not.
August 6, 2018 at 10:12 am
Eirikur Eiriksson - Monday, August 6, 2018 8:58 AMJeff Moden - Monday, August 6, 2018 8:46 AMScottPletcher - Monday, August 6, 2018 8:14 AMJeff Moden - Monday, August 6, 2018 8:00 AMScottPletcher - Monday, August 6, 2018 7:43 AMFor storing of SSN, you might consider adding a check digit to the value, so that it does become 10 digits (or 11 or whatever). That way they are trying to hack into the wrong number of digits, which should slow down the process a bit at least.If it's stored that way in plain text, a hacker will eat that up in less than a second. The only right way to protect such things is with properly salted encryption.
Not talking about plain text, but encrypting a value with extra digit(s) added. Could even add random digits in fixed locations, just to make it harder for someone to know how many digits they were trying to hack.
What's the difference between that and using "proper salting"?
That's what is called obfuscation, no substitute for security, especially when there are known checksum algorithms to validate the numbers. May add a slight overhead but nothing that comes close to good encryption with a salt / private key.
😎There are many cases where businesses have relied on such measures and utterly failed.
The difference is that it doesn't have to stored like a salt. I didn't say it was the ultimate way. Frankly, for something like a SSN, I'd store it in like 3(+) different columns with different names, each encrypted, and then put it back together only when really needed. Real uses of the actual SSN are so low I think you could easily deal with the overhead of that. And for all decency's sake, whatever you do, don't name the column "SSN". This is one time where clear naming is NOT desired.
SQL DBA,SQL Server MVP(07, 08, 09) "It's a dog-eat-dog world, and I'm wearing Milk-Bone underwear." "Norm", on "Cheers". Also from "Cheers", from "Carla": "You need to know 3 things about Tortelli men: Tortelli men draw women like flies; Tortelli men treat women like flies; Tortelli men's brains are in their flies".
August 6, 2018 at 10:47 am
ScottPletcher - Monday, August 6, 2018 10:12 AMAnd for all decency's sake, whatever you do, don't name the column "SSN". This is one time where clear naming is NOT desired.
Absolutely agreed on that one! "TaxID" is the other one to avoid if you're working with businesses.
--Jeff Moden
Change is inevitable... Change for the better is not.
August 6, 2018 at 11:40 am
Jeff Moden - Monday, August 6, 2018 10:47 AMScottPletcher - Monday, August 6, 2018 10:12 AMAnd for all decency's sake, whatever you do, don't name the column "SSN". This is one time where clear naming is NOT desired.Absolutely agreed on that one! "TaxID" is the other one to avoid if you're working with businesses.
He he, on that note, one should have few columns like Password, Bank PIN, SSN, Mistress Number etc, the more the better, fill them with encrypted rubbish, keeps the flies away😀
😎
Viewing 7 posts - 16 through 21 (of 21 total)
You must be logged in to reply to this topic. Login to reply