Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Absolutely unsecure #34

Open
redskate opened this issue Jul 1, 2021 · 3 comments
Open

Absolutely unsecure #34

redskate opened this issue Jul 1, 2021 · 3 comments

Comments

@redskate
Copy link

redskate commented Jul 1, 2021

Thank you for publishing this :)

The software is very nice - uses itself mysqldump .
It produces a secure (compressed and encrypted) output but - due to the fact that everything is defined via plain text, included passwords, it is highly insecure.

Every developer / hacker is able to de-engineer it, to grasp the connection parametes, to use them to run a simple mysqldump, to steal DB data.

@cytopia
Copy link
Owner

cytopia commented Jul 2, 2021

@redskate thanks for raising the concern.

due to the fact that everything is defined via plain text, included passwords,

If you've been on any Debian machine with MySQL installed, you will notice that there is also a /etc/mysql/debian.cnf which contains MySQL credentials with root level access to DB. This is normal behaviour and the file has according file level permissions so that only the root user can access the file (with clear-text credentials). This is pretty mich the same with mysqldump-secure configuration files.

Usually also if you compromise the root user, you can always compromise the rest of the system.

Other than this, can you please elaborate how else a developer would steal the connection parameters?

@redskate
Copy link
Author

redskate commented Jul 3, 2021 via email

@viperzero
Copy link

I see that redskate has spent some time tinkering with sec. So basically all the public systems are exposed to db decrypting attempts if there is 1.) access to crypted db in time series 2.) infiltrator can add data to db between different encrypted backup db versions. So the known variables makes it a lot easier to decrypt without so much of computational power. I know this kind of techniques are widely used becaus R/R sometimes justifies infiltrators to use very bright (but still computationally expensive) algorithms.

So it makes redskates proposals somewhat useful on tighter security environments. At least I would not recommend publishing this kind of material in internet: un encrypted Mega backup tutorial , db backups are great but how you store them is a different thing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants