The way this is done is over some secure tunnel at the time of transaction.
Verisign's (now Paypal's) tags do that, as well as most other companies I
believe.  Locally you should never store the credit card, only the
transaction id from the cc company.  If your server is compromised, they
cannot get any old cc #'s, although they can probably sniff transactions as
they happen, but there's really nothing you can do about that.  Just try to
keep your server as secure as you can. 

Russ



> -----Original Message-----
> From: Steve Kahn [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, June 06, 2007 1:27 PM
> To: CF-Talk
> Subject: RE: Form Encryption
> 
> Very good points across the board.
> Technically, I do not need to store the credit card info in the db.
> However I do need to securely send/pass/or make available the credit card
> info to the receiving company. Maybe there is a better method to do so.
> 
> Steve
> 
> -----Original Message-----
> From: Matt Robertson [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, June 06, 2007 12:53 PM
> To: CF-Talk
> Subject: Re: Form Encryption
> 
> You can use asymmetric-key RSA encryption economically...
> 
> http://developer.perthweb.com.au/textcrypt.html
> 
> I've been using that tool for many years.  its about as safe as you
> can get for encrypting stored data.  Key part of that phrase is "as
> you can get".
> 
> The problems with symmetric key encryption were already well-stated.
> Don't even think of doing that.  In theory a combination of SSL and a
> 128-bit RSA encryption provide a commercial-strength solution, but I
> would argue that its a horrible idea to store credit card info on a
> server you are responsible for.  Its such a gross violation of best or
> even acceptable practices in the IT and financial industries that the
> liability you will bear if the chain of custody on the private key is
> compromised... the liability you will personally incur, as well as
> what your client will incur... its not worth the risk.
> 
> I would suggest that, if you are storing data encrypt ALL of it to
> make the job more difficult.  Do not name the fields with
> hacker-usable names (like credit_card_number) Use symmetric key
> encryption to encrypt first, then use asymmetric to encrypt that.
> Access your db server via a 2nd nic and make that 2nd nic go to the
> other server via internal IPs only.
> 
> ..... and say your prayers regularly.
> 
> --
> [EMAIL PROTECTED]
> Janitor, The Robertson Team
> mysecretbase.com
> 
> 
> 
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Upgrade to Adobe ColdFusion MX7
The most significant release in over 10 years. Upgrade & see new features.
http://www.adobe.com/products/coldfusion?sdid=RVJR

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:280288
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4

Reply via email to