WineHQ database compromised
WineHQ database compromised
Posted Oct 12, 2011 0:25 UTC (Wed) by jake (editor, #205)In reply to: WineHQ database compromised by Cyberax
Parent article: WineHQ database compromised
No we do not (thankfully) ... we transmit them to the credit card processor and are done with them at that point. For monthly subscriptions, we get back a magic cookie that can be used to charge the same account, but we don't keep credit card information.
We sleep *much* easier that way ...
jake
Posted Oct 12, 2011 0:51 UTC (Wed)
by aaron (guest, #282)
[Link] (5 responses)
BTW, as one of many sysadmins handling PCI compliance (in addition to our usual duties), can you comment on how the process worked for you?
There's a good talk coming up in Seattle this Thursday, on audit logging on Linux for compliance. Apparently, it's not as trivial as one might hope.
Posted Oct 12, 2011 1:01 UTC (Wed)
by corbet (editor, #1)
[Link] (4 responses)
The penalty for not being certified was a crushing $25/month; there came a point where we realized it just wasn't worth the trouble.
$25/month also made it clear just how important the credit card system thought PCI compliance certification was.
Now we don't let credit card numbers pass through the site at all, and things are a lot easier.
Posted Oct 12, 2011 9:10 UTC (Wed)
by njwhite (guest, #51848)
[Link]
Yep, that sounds about our experience, too. I ended up writing a script to scrape info of patched CVE issues from our distribution's website and emailing the PCI people a list of links to "prove" that said patches have been applied.
It's all, I think, so that the card processor can push the liability for any losses away from them.
Posted Oct 12, 2011 16:44 UTC (Wed)
by aaron (guest, #282)
[Link]
I assume that was the ASV*, not the processor. Ours simply needed to be told the the CVEs were patched (which Debian & Ubuntu are good at doing, and more importantly, documenting.) It was a good impetus to turn off the detailed version info on our daemons. <smirk>Information leak, y'know.</smirk>
Interestingly, an SSL cert. company that recently suffered security problems also happens to be an ASV.
Posted Oct 12, 2011 21:59 UTC (Wed)
by rickmoen (subscriber, #6943)
[Link]
Rick Moen
Posted Oct 13, 2011 4:05 UTC (Thu)
by k8to (guest, #15413)
[Link]
It's all too familiar to hear from customers (from auditors) that their scan-thing found a red item. Usually these red items represent bugs in the scanners, but they don't care (neither the auditor, nor the customers).
Fortunately our software doesn't have to actually pass the test software (it doesn't touch the card stream). So I point out some of the clauses of PCI compliance that say they don't have to care, and suddenly they're happy.
Sigh.
Posted Oct 12, 2011 6:19 UTC (Wed)
by Felix.Braun (guest, #3032)
[Link]
Posted Oct 12, 2011 17:27 UTC (Wed)
by quotemstr (subscriber, #45331)
[Link] (1 responses)
Posted Oct 12, 2011 18:13 UTC (Wed)
by jake (editor, #205)
[Link]
bcrypt hashing ... see http://lwn.net/Articles/433905/ for a few more details ...
jake
WineHQ database compromised
With our previous processor, the compliance process turned out to be such a silly hassle that we eventually gave up on it. They kept screaming, for example, that our version of SSH had known vulnerabilities - even though the distributor had long since patched those vulnerabilities out. All that mattered was The Checklist, which had little to do with how secure we actually were.
PCI compliance
PCI compliance
> SSH had known vulnerabilities - even though the distributor had long since patched those
> vulnerabilities out. All that mattered was The Checklist, which had little to do with how
> secure we actually were.
PCI compliance
They kept screaming, for example, that our version of SSH had known vulnerabilities - even though the distributor had long since patched those vulnerabilities out.
* ASV: Approved Scanning Vendor - a company approved by the PCI Security Standards Council to perform very basic (Nessus-style) vulnerability scans. Scans are required quarterly. Subscriptions aren't cheap.
PCI compliance
rick@linuxmafia.com
PCI compliance
WineHQ database compromised
WineHQ database compromised
WineHQ database compromised