Don

Thanks for your response.  The issue I have is that the password for our
database is stored either in the ODBC registry or within our ASP page as
plain text.  One option I have is to encrypt the password in the database
connnection string and have a function with a key in a external file that
can unlock it.

The problem remains though - that if the web server is hacked, the hacker
can still navigation there way to the file containing the key to unlock the
password.

Does that make any sense ?

Cheers
Neil

On Fri, Nov 20, 2009 at 3:18 PM, Don Cohen <don-mysq...@isis.cs3-inc.com>wrote:

> Tompkins Neil writes:
>  > I wondered if anyone else had any thoughts on this issue ?
>  > >> Following my previous email.  I've now configured my database
> connection
>  > >> using a ODBC DNSLESS SSL connection. However the problem still
> remains,
> I'm not sure what dnsless means (that you allow only certain ip
> addresses?) or what difference it makes.
>
>  > >> the
>  > >> password is stored in the ASP file in plain text.  Does anyone have
> any
>  > >> recommendations on how to overcome this issue ?
> Is the issue that you're worried that your web server will serve the
> contents of the asp file?  And I gather that you want the file to
> access the DB without the user having to supply a password.
> I'll just guess that asp files are similar to php files.
> One thing you could do is have that file read the password from
> another file that is in some place where the web server does not look.
>
>  > > Secure the access to the ASP-source file.
>  > > You *could* encrypt it but then you have to store the key for it
> somewhere
>  > > the ASP can access and ..... Catch 22.
>

Reply via email to