This Thursday (June 10th, 14:00 UTC), Darren
Cassar will rerun his February 25 presentation of Securich - Security Plugin for MySQL.
(Recording of the session failed in February; hopefully it will
succeed this time.) According to Darren, the author of the
plugin, Securich is an incredibly handy and versatile tool for
managing user privileges on MySQL through the use of roles. It
basically makes granting and revoking rights a piece of cake, not
to mention added security it provides through password expiry and
password history, the customization level it permits, the fact
that it runs on any MySQL 5.0 or later and it's easily deployable
on any official MySQL binary, platform independent.
More information here: …
This Thursday (June 10th, 14:00 UTC), Darren
Cassar will rerun his February 25 presentation of Securich - Security Plugin for MySQL.
(Recording of the session failed in February; hopefully it will
succeed this time.) According to Darren, the author of the
plugin, Securich is an incredibly handy and versatile tool for
managing user privileges on MySQL through the use of roles. It
basically makes granting and revoking rights a piece of cake, not
to mention added security it provides through password expiry and
password history, the customization level it permits, the fact
that it runs on any MySQL 5.0 or later and it's easily deployable
on any official MySQL binary, platform independent.
More information here: …
By default MySQL allows you to create user accounts and privileges with no password. In my earlier MySQL Best Practices: User Security I describe how to address the default installation empty passwords.
For new user accounts, you can improve this default behavior
using the SQL_MODE variable, with a value of NO_AUTO_CREATE_USER.
As detailed via the 5.1 Reference Manual
NO_AUTO_CREATE_USER
Prevent the GRANT statement from automatically creating new users
if it would otherwise do so, unless a nonempty password also is
specified.
Having set this variable I attempted to show the error of operation to demonstrate in my upcoming “MySQL Idiosyncrasies that bite” presentation. …
[Read more]It is critical that you do not use the default MySQL installation security, it’s simply insecure.
Default Installation
When installed, MySQL enables any user with physical permissions to the server to connect to the MySQL via unauthenticated users. MySQL also provides complete access to all super user privileges via the ‘root’ user with no default password.
$ mysql -uroot mysql> SELECT host,user,password FROM mysql.user; +--------------+------+-------------------------------------------+ | host | user | password | +--------------+------+-------------------------------------------+ | localhost | root | | | server.local | root | | | 127.0.0.1 | root | | | localhost | | | | server.local | | …[Read more]
MySQL 5.1.47
In addition to the security update, MySQL 5.1.47 is also very important for an additional reason. The InnoDB plugin that ships with this version has been updated to 1.0.8, which is …
[Read more]MySQL 5.1.47
In addition to the security update, MySQL 5.1.47 is also very important for an additional reason. The InnoDB plugin that ships with this version has been updated to 1.0.8, which is …
[Read more]MySQL 5.1.47
In addition to the security update, MySQL 5.1.47 is also very important for an additional reason. The InnoDB plugin that ships with this version has been updated to 1.0.8, which is …
[Read more]
Financial services on the go - GlassFish for Fundamo and
profit
Alexis recently published a new Adoption Story
on how Fundamo uses GlassFish v2 and OpenMQ for its
Enterprise Platform. Overview at stories entry, details in questionnaire, and an overview in this earlier
short video interview.
We are always interested in more GlassFish adoption stories, both from
(non-paying) users and from (paying) customers. …
Here’s a sneak peek at a video matrix — this is all the videos that include Pythian Group employees at the MySQL conference. I hope to have all the rest of the videos processed and uploaded within 24 hours, with a matrix similar to the one below (but of course with many more sessions).
Title | Presenter | Slides |
Video link (hr:min:sec) |
Details (Conf. site link) |
---|---|---|---|---|
Main Stage | ||||
Keynote: Under New Management: Next Steps for the Community | Sheeri K. Cabral (Pythian) | N/A |
18:16 |
… |
I gave a presentation today at the MySQL Conference & Expo 2010, titled SQL Injection Myths and Fallacies. Thanks to everyone who came to my talk! I appreciate your interest in learning to develop more secure applications. SQL Injection is a serious threat to web applications, and it's only going to get worse. It's incumbent on you as software developers to learn how to write secure code!My