Solved

How to Verify an Encrypted Connection in MS SQL Server 2000 from a Coldfusion Data Source

Posted on 2010-09-01
4
759 Views
Last Modified: 2012-05-10
I have a SSL certificate on a box running windows 2003 and MS SQL Server 2000.

I'm using coldfusion data source to hold the encrypted connection string.

In the Data Source - Advanced - section I added "ValidateServerCertificate=false;EncryptionMethod=SSL" in the query string box.

My web app is working great. but how do I verify that the connection is in fact encrypted?

Remember I'm using sql server 2000 so I guess my choices are limited if I want to inspect a sql connection.

I'm not opposed to installing some sort of sniffing application.

What would be the best and easiest way to make sure my web app is using an encrypted connection?

0
Comment
Question by:FastEddie___
  • 2
  • 2
4 Comments
 
LVL 12

Expert Comment

by:patrikt
ID: 33585482
You can use SQL Server Profiler and trace cnnection events. I have no SQL 2000 instance available to check which events and data are available but all has meaningfull names so you should find it.
0
 

Author Comment

by:FastEddie___
ID: 33587864
That's a good suggestion patrikt but I could not get any meaningful infrormation with the SQL Profiler.
I first tried to use only the "Connection" filter info then I tried the default template.
Niether returned data to check for encrypted connections.
Do you have any other ideas?
 
0
 
LVL 12

Accepted Solution

by:
patrikt earned 500 total points
ID: 33590790
Did you checked all data columns of that event? It s by default hidden.
I'm not sure if SQL 2000 event contains enough information, but it should.
0
 

Author Closing Comment

by:FastEddie___
ID: 33627361
I didn't recheck the fields
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

In this article I will describe the Copy Database Wizard method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now