guides:reference:database:encryption
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
guides:reference:database:encryption [2019/12/23 16:11] – ↷ Page moved from maintenance:general:encryption to guides:reference:database:encryption yspeerte | guides:reference:database:encryption [2024/07/03 12:31] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ===== Encryption ===== | ||
+ | |||
+ | NetYCE uses encryption in several places of the application: | ||
+ | * User authentication passwords | ||
+ | * Application Login forms | ||
+ | * Distribution files | ||
+ | * Customer database backups (archives) | ||
+ | * Selected columns in the database | ||
+ | |||
+ | |||
+ | ==== User passwords ==== | ||
+ | |||
+ | User passwords (local accounts) are not encrypted but hashed. The difference is that the hashing process is one-way, the user password cannot be regenerated from the hash. | ||
+ | |||
+ | Currently the user password (and the password history as well) are stored in hashed format using the MD5 algorithm. We do not hash the user password by itself, but is concatenated with the userid and a ' | ||
+ | |||
+ | The purpose of the concatenation and realm usage is that the customer can define its own secret-string (the realm) and that a pre-md5-hashed password-dictionary approach will not work. | ||
+ | |||
+ | A future implementation of the user-password storage will replace the MD5 algorithm with a stronger SHA512 hash, but will continue to use the concatenation and realm usage. The impact of requiring all users to redefine their password and losing the password history prevented us from giving it a high priority. | ||
+ | |||
+ | |||
+ | ==== Login ==== | ||
+ | |||
+ | The login form accepts a user password for validation. This password may not be sent ' | ||
+ | |||
+ | Later, when LDAP support was added, the user password in clear-text was required at the server for authentication with the LDAP server. The MD5 hash could not provide this so an additional step was created in which the user password got encrypted with the ' | ||
+ | The algorithm for this scheme is based on '' | ||
+ | |||
+ | Unfortunately, | ||
+ | |||
+ | |||
+ | ==== Database archives ==== | ||
+ | |||
+ | The NetYCE database from any customer contains all relevant networking information, | ||
+ | |||
+ | The encryption key used for this purpose is taken from the NetYCE license file ''/ | ||
+ | |||
+ | NetYCE database archives are created and restored using the front-end tool 'DB archives' | ||
+ | |||
+ | |||
+ | ==== Distribution files ==== | ||
+ | |||
+ | NetYCE distribution files are encrypted using a Triple-DES algorithm. This is to achieve two purposes. First the software consists of many scripted source files and only a few compiled daemons. To prevent our software to show up on some free internet share, encryption is used. | ||
+ | |||
+ | Second, the NetYCE software uses a licensing schema to selectively install the appropriate software. By using encryption, only those packages licensed by a customer can be decrypted and installed. This way we can create a single distribution file containing all packages without risk. | ||
+ | |||
+ | |||
+ | ===== Column encryption ===== | ||
+ | |||
+ | ==== Design ==== | ||
+ | |||
+ | Selected database columns are stored encrypted. These columns will be decrypted automatically when using the application (front-end and back-end) but are inaccessible using other means. | ||
+ | |||
+ | These encrypt and decrypt functions will have to be available to different components of NetYCE: front-end, patch-files, | ||
+ | |||
+ | Due to this diversity, we choose not to use the standard encryption functions build in the MySQL / MariaDB databases. This choice safeguards us also from the risk of MySQL or MariaDB support or vulnerabilities or switching to other databases. | ||
+ | |||
+ | So we created our own '' | ||
+ | |||
+ | The encryption algorithm of choice is AES256. This algorithm requires both a ' | ||
+ | |||
+ | The key file, ''/ | ||
+ | |||
+ | The database archives (backups) include the list of encryption keys found in '' | ||
+ | |||
+ | >> A blank < | ||
+ | |||
+ | To identify which key was used to encrypt a given value, the key-id is included in the encrypted value. Also, to detect if a value string was already encrypted or not, the encrypted string will include a checksum. A string not matching a valid key-id and has an invalid checksum must therefore be a true value requiring encryption. | ||
+ | |||
+ | Table modifications were required to store the encrypted value of the column since they are generally much longer. Encrypted values will NOT be stored binary but base64 encoded. This to allow convenient SQL (debug) logging and reliable export and import functions. | ||
+ | |||
+ | The stored format for the encrypted string therefore consists of a concatenation of: | ||
+ | < | ||
+ | The < | ||
+ | the < | ||
+ | and the < | ||
+ | |||
+ | Practically ALL database access is handled by the '' | ||
+ | |||
+ | This imposes limitations on the SQL SELECT statement the programmer may use: \\ | ||
+ | * encrypted column names must be unique - the col name identifies the value to be decrypted | ||
+ | * encrypted column names must not be renamed in the SQL using AS or functions altering the SQL col name returned. | ||
+ | Further: | ||
+ | * the list of column names to de decrypted must be manageable (not to long to become slow) | ||
+ | * the list of column names to de decrypted must be externally defined, not hardcoded. | ||
+ | |||
+ | As for the non-select SQL statements INSERT and UPDATE, the on-the-fly encryption is much harder since is must rely on SQL parsing to deduce the column name. Initial research code demonstrated that this parsing is too unreliable for production purposes. Alternatively, | ||
+ | |||
+ | Instead, after we realized that the encryption does not have to take place immediately with the INSERT or UPDATE, a simpler solution presented itself: The task of (ensuring) the selected columns are stored properly encrypted is performed by a background process, the '' | ||
+ | |||
+ | Care must be taken that in database-replication setups (using master-master) only ONE of the masters may execute this background process. If both were to modify the same fields simultaneously, | ||
+ | |||
+ | Another consequence of using the Update-timestamp() feature of the table is that the encryption record update triggers an update of the timestamp. Although this would result in a no-update at the second run, this trigger consumes resources. By setting the update-timestamp with the original value the trigger can be cleared. | ||
+ | |||
+ | To identify what tables and columns to examine for unencrypted values, an external definition file is required. The XML-formatted file ''/ | ||
+ | |||
+ | The default crypt_cols.xml file: | ||
+ | <code xml> | ||
+ | < | ||
+ | <table name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | <column name=" | ||
+ | </ | ||
+ | <table name=" | ||
+ | <column name=" | ||
+ | </ | ||
+ | <table name=" | ||
+ | <column name=" | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
+ | |||
+ | The reference to the table '' | ||
+ | |||
+ | Two entries in the Lookup are used for the encryption administration. First there is the variable '' | ||
+ | |||
+ | The second lookup variable is ' | ||
+ | |||
+ | ==== Procedures ==== | ||
+ | |||
+ | === Remove encryption === | ||
+ | |||
+ | To remove the column encryption of all fields currently in '' | ||
+ | - Edit the '' | ||
+ | - Kill the '' | ||
+ | |||
+ | |||
+ | === Add new encrypted column === | ||
+ | |||
+ | Edit the '' | ||
+ | |||
+ | If the '' | ||
+ | |||
+ | |||
+ | === Remove an encrypted column === | ||
+ | |||
+ | It is NOT sufficient to remove a column from the '' | ||
+ | |||
+ | - Edit the '' | ||
+ | - Kill the '' | ||
+ | - Modify the '' | ||
+ | - Edit the '' | ||
+ | - Open in the front-end the 'Admin - Lookup' | ||
+ | - Locate the '' | ||
+ | - Locate the '' | ||
+ | - Kill the '' | ||
+ | |||
+ | |||
+ | === Changing the active encryption key === | ||
+ | |||
+ | The default encryption key is derived from the customer' | ||
+ | |||
+ | The procedure to realise the activation of a new key: | ||
+ | - Edit the '' | ||
+ | - Kill the '' | ||
+ | |||