liviusliv...@poczta.onet.pl wrote:
> Hi,

> what security risk do you see with context vars?
> Context vars are stored on server side - what i am missing
> here?
> This so secure as secure is sending password at conection
> start time ;-)
> I you secure transmision what problem?

> regards,
> Karol Bieniaszewski

As Alex pointed out, passwords aren't normally sent at
connection time.

If the security of this depends on secure transmission of
normal data then the approach adds a not-insignificant burden,
and suddenly it's not simple any more.  Will this requirement
be remembered with every change that might compromise it?

Anyone monitoring the server (MON$) can read the context
variables of all users.  And while this should only be admin
there are issues even here:

  * administrators should not know users passwords

    I know that in the real world of lax security - and the
    ability to trace ALTER USER commands - this is not a
    completely realistic expectation with Firebird.
    But it should be!

    When an administrator changes a user's password the user
    should be strongly encouraged to reset it to something new.
    Yes, the admin can change it to something they know and
    pretend to be that user, but if they don't know the
    original password they can't set it back again, so they
    leave a trail.

  * administrators monitoring the database may be showing
    other people certain things on the screen, do we really
    want users passwords sitting up there next to everything
    else, for anyone walking past to see?  It might even be
    the admin password!  (If we assume you want the admin to
    be able to run the same procedure.)

  * the password becomes something readable by query from
    the user, which leaves various forms of abuse or accident
    possible depending on the application and environment.

  * while we know that no developer ever accidentally makes
    mistakes that gives unexpected access to a system, there
    being a long history that proves this conclusively, if
    this should even happen then having passwords (even
    possibly even the admin password) in context variables
    becomes a big potential exposure.


But, put most simply, it all comes down to this:  The more
redundant copies and transfer of secure information that a
system makes, the more it opens itself to error, accident and
abuse.  As such, any requirement to do this should be looked
on with suspicion.

-- 
Geoff Worboys
Telesis Computing Pty Ltd





------------------------------------------------------------------------------
Dive into the World of Parallel Programming. The Go Parallel Website,
sponsored by Intel and developed in partnership with Slashdot Media, is your
hub for all things parallel software development, from weekly thought
leadership blogs to news, videos, case studies, tutorials and more. Take a
look and join the conversation now. http://goparallel.sourceforge.net/
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to