TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

PCI Compliance - The Good, The Bad, and The Insecure - Part 2

36 点作者 fmavituna超过 11 年前

11 条评论

tptacek超过 11 年前
Salted SHA512 is <i>absolutely not</i> a safe way to store authenticators for payment card information. Using salted hashes for payment cards is even worse than using it for passwords, because the input domain for payment card information is so much smaller.<p>If a pentester finds that you did that, you will almost certainly get that written up sev:hi.<p>We work with lots of companies that handle payment card information (though we do not do PCI audits, which are a race to the bottom). The best practice solution for this problem is to isolate the cardholder information on a protected backend machine, keep it encrypted, and replace it on every other machine with an opaque token.<p>(You are much better off using Stripe or Braintree than doing this yourself.)
评论 #6606478 未加载
评论 #6606001 未加载
评论 #6606161 未加载
JonFish85超过 11 年前
PCI is a bullshit standard anyways, in my opinion. Any standard that specifically states that the moment you are breached, you are &quot;out of compliance&quot; is a scam in my opinion. &quot;If you follow this, then you&#x27;ll be safe, but if you get breached, by default, you weren&#x27;t in compliance&quot;. I&#x27;m not really sure who that protects, exactly. I hate it.
评论 #6606645 未加载
Osiris超过 11 年前
Personally, I think that credit cards should use two factor authentication. Put an e-ink strip on the back of the card that displays a new 6 digit pin every 10 minutes or so. The pin would be required to complete in-person and online transaction.<p>Skimmers would become useless because the PIN number entered would only be good for a few minutes after it was captured. Stealing a credit card number and sharing online would be equally useless without the physical card.<p>This would, of course, cause some problems for online purchases, like Amazon&#x27;s 1-click, but something like vendor-specific passcodes could solve that. You could go to your credit card website and request a passcode to provide to a specific online store. If their database gets compromised, you can revoke the password.
评论 #6611921 未加载
评论 #6611030 未加载
lsh123超过 11 年前
PCI standard is the <i>minimum</i> requirement. In my experience, people don&#x27;t really think about security and PCI at least forces them to think and ask questions. From this perspective, PCI is actually doing its job.
评论 #6606939 未加载
david_shaw超过 11 年前
Just as a quick aside: PCI compliance is a huge (mandatory) motivation that fuels much of the information security industry. While I&#x27;m careful not to &quot;bite the hand that feeds,&quot; there is a large gap between being PCI compliant and being in any way secure. For those that are interested, hacker&#x2F;security conferences such as DEF CON, Black Hat, ShmooCon, etc. regularly have interesting presentations on completely owning PCI compliant networks.
评论 #6606975 未加载
acd超过 11 年前
PCI compliance is actually there because the card industry uses 1970 style security. Fact is the ATM cryptos was broken in the 1990s and it is more expensive to change all the card terminals than compensate the customers for fraud.<p>Most broken is the fact that US credit cards still uses magnetic stripe when everyone else have converted to using smart card chips. Why the is there visible PAN numbers on the cards and magnetic stripes this is year 2013.<p>Fact card companies uses broken security mechanisms on the cards. Then everybody else have to comply with PCI because their broken security.
评论 #6605834 未加载
zrail超过 11 年前
Ken Cochrane has a really good guide to PCI compliance from a developer&#x27;s standpoint. The main point that it drives home, though, is that you really don&#x27;t want to ever be in a position where you could be touching card-level data. You want to hand that off to Stripe, Braintree, Balanced, PayPal, <i>someone</i> else before it hits your server.<p><a href="http://kencochrane.net/blog/2012/01/developers-guide-to-pci-compliant-web-applications/" rel="nofollow">http:&#x2F;&#x2F;kencochrane.net&#x2F;blog&#x2F;2012&#x2F;01&#x2F;developers-guide-to-pci-...</a>
ChikkaChiChi超过 11 年前
PCI-DSS is a great tool to get management to understand what sort of security is required to handle customer&#x27;s data properly. It&#x27;s not meant to be a handbook for security experts to tick off a bunch of boxes and act like they are Neo with Kung-Fu.<p>If you have ever been in a meeting and been face to face with the blank stares of management while you explain why you need to spend time on hardening your servers or software, you would be thankful that PCI exists.
16s超过 11 年前
The way I read the standard, the string &#x27;soccer1&#x27; is a valid&#x2F;compliant PCI password. At least it for PCI-DSS v2.<p>8.5.10 Require a minimum password length of at least seven characters.<p>8.5.11 Use passwords containing both numeric and alphabetic characters.<p>In fact, the string &#x27;password1&#x27; exceeds the requirements.
rayiner超过 11 年前
PCI = peripheral component interconnect? I don&#x27;t get it.
评论 #6605684 未加载
评论 #6605668 未加载
评论 #6605760 未加载
nraynaud超过 11 年前
about encrypting the card data, can&#x27;t you encrypt with an RSA public key and store the private key off-site? I thought it also worked backwards like that.
评论 #6607213 未加载