Solved

MySQL/MyODBC Remote Access Security

Posted on 2004-04-14
3
551 Views
Last Modified: 2012-06-27
Hi,

I am looking at sharing a small (2Mb) DB across several sites over the internet using an MS Access front end and MySQL back end.  I have tried this by setting up a remote DSN using MyODBC and it seems to work well.  The only thing I am concerned about is security.     I am aware that you can set passwords and limit IP addresses.  I am aware that the data is not encrypted.     Are there real security issues with this?      How can I resolve these?    Can I use a VPN and/or firewall to improve security?  One limiting factor is that it has to work over a 56K connection.
0
Comment
Question by:lnwright
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
andydis earned 500 total points
ID: 10832388
yes please use a VPN....
there are alot of my sql vulnerbilities but i cant post them here (fink they are banned)

do a google search for mysql and exploit and see what happens

ref:
Mysql 3.23.x/4.0.x Remote mysql privileges Exploit
 



/* Mysql 3.23.x/4.0.x remote exploit
* proof of concept
* using jmp *eax
* bkbll (bkbll cnhonker.net,bkbll tom.com) 2003/09/12
* compile:gcc -o mysql mysql.c -L/usr/lib/mysql -lmysqlclient
* DO NOT DISTRUBITED IT

 
0
 

Author Comment

by:lnwright
ID: 10833295
Thanks for the comment.    I am thinking of using SSH tunnel.   Would that be better?
0
 
LVL 4

Assisted Solution

by:andydis
andydis earned 500 total points
ID: 10833354
ssh Vs VPN>



SSH=
SSH is an advanced protocol providing secure encrypted remote communications over an unsecured channel, such as the Internet. A hostile user that has control over the network can only force SSH session to disconnect, but cannot decrypt or play back the traffic, or hijack the connection. SSH replaces telnet, r services and other third-party applications. SSH protocol version1 and 2 are available on the market today. Protocol version 2 is considered to be more secure than protocol version 1 because it uses the Diffie-Helmann algorithm for host authentication. This algorithm prevents passwords from being stolen during the login process.

Using the SSH port forwarding feature, systems administrators can select only the applications they want to encrypt, based on their corporate security policy. This reduces creating unnecessary potential network overhead that is associated with encryption. Any application that has a static port assignment, such as POP, SMTP, and Oracle database connections can be encrypted.


VPN=
An IP-based Virtual Private Network (VPN) provides a secure tunnel for transmitting data through an unsecured network such as the Internet. There are several protocols that can be used to achieve this including PPTP, L2TP, L2F, and IPSEC. IPSEC is the only protocol that is an IETF standard. A VPN is "virtual" because it does not require dedicated lines. It is "private" because encryption is used to achieve security. It also uses an IP "network" for communication.

Conclusion,

vpn would be easier to manage and implement, all hardware/software companies now are heading in or have taken up VPn technology, the next stagew to this would be SSL VPn's where SSH would become obsolete

0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Help with Data Warehouse / Data Marts 4 41
Need to trim my database size 9 52
When are cursors useful? 8 60
How do you think this website does searches? 5 34
CCModeler offers a way to enter basic information like entities, attributes and relationships and export them as yEd or erviz diagram. It also can import existing Access or SQL Server tables with relationships.
This article shows the steps required to install WordPress on Azure. Web Apps, Mobile Apps, API Apps, or Functions, in Azure all these run in an App Service plan. WordPress is no exception and requires an App Service Plan and Database to install
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question