| From: | dom(at)happygiraffe(dot)net (Dominic Mitchell) |
|---|---|
| To: | Greg Stark <gsstark(at)mit(dot)edu> |
| Cc: | pgsql-general(at)postgresql(dot)org |
| Subject: | Re: When to encrypt |
| Date: | 2004-12-06 09:58:05 |
| Message-ID: | 20041206095805.GA50010@ppe.happygiraffe.net |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-general |
On Sun, Dec 05, 2004 at 11:31:34PM -0500, Greg Stark wrote:
> Derek Fountain <dflists(at)iinet(dot)net(dot)au> writes:
> > If another SQL Injection vulnerability turns up (which it might, given the
> > state of the website code),
>
> You will never see another SQL injection vulnerability if you simply switch to
> always using prepared queries and placeholders. Make it a rule that you
> _never_ interpolate variables into the query string. period. No manual quoting
> to get right, no subtle security audit necessary: If the SQL query isn't a
> constant string you reject it.
Another good piece of defense is mod_security (assuming that your web
server is Apache). You can teach it about SQL injection attacks with a
little work.
-Dom
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Pierre-Frédéric Caillaud | 2004-12-06 10:12:17 | Re: select single entry and its neighbours using direct-acess to index? |
| Previous Message | Postgres Learner | 2004-12-06 09:28:46 | 8.0 vs. 7.4 benchmarks |