I'm work at McAfee at the moment and I stumbled across
this:
They have a free (GNU General Public License according to
the download) MySQL plugin for auditing MySQL - https://github.com/mcafee/mysql-audit/downloads
(yay, for using github)
They also have an enterprise-level database security product
which of course is not free (no idea how much) and a video
explaining what it does can be found here.
Another MySQL security company is, of course, …
I’m in the process of getting the tests passing for the 0.03 release of NIST::NVD::Store::SQLite3 wherein our hero imports the CWE data and cross-indexes it with CVEs and CPEs.
Follow along and suggest some patches. I’m developing on Debian Wheezy, but I would very much like input from devs on other platforms.
http://git.colliertech.org/?p=NIST-NVD-Store-SQLite3.git;a=summary
cjac@foxtrot:/tmp$ time git clone http://git.colliertech.org/git/NIST-NVD-Store-SQLite3.git Cloning into 'NIST-NVD-Store-SQLite3'... real 0m32.757s user 0m0.200s sys 0m0.088s cjac@foxtrot:/tmp$ ls NIST-NVD-Store-SQLite3/t/data/ cwec_v2.1.xml nvdcve-2.0-test.xml
Publish your patches and I’ll fetch them, or you can submit them in udiff format and I’ll review/apply. Thanks for playing along!
[edit 20120216T1456 -0800] …
[Read more]Today at the RMOUG Training Days 2012 event I gave an introduction presentation on MySQL Security Essentials covering the following topics:
- MySQL Security defaults
- MySQL Security Improvements
- OS Security
- User Privileges
- Data Integrity
- Installation Practices
- Auditing Options
- Better Security
- Further References
Download slides for MySQL Security Essentials.
I published an SQLite3 storage back-end to NIST::NVD on the CPAN. It’s pretty quick. About as fast as the DB_File one, but without the down side of being tied to DB_File. It shouldn’t be too difficult to re-factor this code to any DBI-based database. MariaDB anyone?
I know it works on Debian. The nightly CPAN test results should come back shortly and I’ll find out how well it works on other platforms.
Don’t share root user password and mysql.user table acess with anyone till you have full trust on it. Because that encrypted password is real password in MySQL so if anyone knows that than he/she can easily login with any user if he has access to his host. Check with “mysql -uroot ” command, If you … Continue Reading …
[Read more]In this primer I will show how to improve the security of your MariaDB installation by using two-step verification and how to use it from your Windows GUI client.
Let’s suppose you have your data in MariaDB, installed, say, on Ubuntu. And your users connect to it to run ad hoc queries, using some sort of a Windows GUI client. You don’t want them to write the access password on post-it notes or have it auto-entered by the client. And you don’t want anyone see the password when one of the salespersons connects to the mother ship from his laptop in the Internet café. So you decide to use the two-step verification, just like Google does, to secure the access to the data.
If you don’t know what a “two-step verification” is, see, for example, this introductory video by Google.
So, 2-step verification looks great, but how …
[Read more]For a work project, I wrote a library in perl that can be used to query the NVD feed that NIST publishes here:
http://nvd.nist.gov/download.cfm
Here’s a snippit from the perldoc:
use NIST::NVD::Query; # use convert_nvdcve to generate these files from the XML dumps at # http://nvd.nist.gov/download.cfm my( $path_to_db, $path_to_idx_cpe ) = @ARGV; my $q = NIST::NVD::Query->new( database => $path_to_db, idx_cpe => $path_to_idx_cpe, ); # Given a Common Platform Enumeration urn, returns a list of known # CVE IDs my $cve_id_list = $q->cve_for_cpe( cpe => 'cpe:/a:zaal:tgt:1.0.6' ); my @entry; foreach my $cve_id ( @$cve_id_list ){ # Given a CVE ID, returns a CVE entry my $entry = $q->cve( cve_id => …[Read more]
Percona just released their MySQL PAM
Authentication insanity, just as Oracle did before, for MySQL 5.5 and MariaDB is no better.
The Oracle module requires a module to be loaded into your
client, which is done automatically if the module is present and
the server supports PAM auth. The module is called ominously
"mysql_clear_password" and does what it says on the tin: Your
database server access password is henceforth sent from the
client to the server in clear, not encrypted, hashed, salted or
otherwise protected.
I suppose the Percona module does the same, although it is not
being mentioned in the docs at all (or at least I have not …
This week we have a big announcement about Sarah, 3 hosts and an extra special guest.
News
Call for papers for Percona Live: MySQL Conference & Expo
2012 is open until Monday, December 5th. The MySQL Conference
& Expo is Tuesday April 10 - Thursday, April 12, 2012 in
Santa Clara, CA.
To submit a paper, first register as a speaker at http://www.percona.com/live/mysql-conference-2012/user/register and then go to My Account -> Submit Proposal.
Main content
Previous podcasts about securing MySQL
Linux, Apache, MySQL and PHP — altogether they mean LAMP. I’m not talking about watts and bulbs.
And if you desire is for a comprehensive, robust server, your IT infrastructure has to include all of these systems.
Monitis has put together a checklist of 101 actions you can take to maximize security around LAMP. Hopefully we’re shedding a little light around this issue for you to give you some new ideas on how to make administering your system easier — so that, in turn, you can focus on more strategic tasks. You …
[Read more]