{"id":4441,"date":"2020-03-27T11:43:54","date_gmt":"2020-03-27T09:43:54","guid":{"rendered":"http:\/\/www.laurentmarot.fr\/wordpress\/?p=4441"},"modified":"2021-04-27T17:03:27","modified_gmt":"2021-04-27T15:03:27","slug":"data-in-transit-encryption","status":"publish","type":"post","link":"https:\/\/www.laurentmarot.fr\/wordpress\/?p=4441","title":{"rendered":"Data-in-Transit Encryption with MariaDB"},"content":{"rendered":"<p>S\u00e9curiser les <a href=\"http:\/\/www.laurentmarot.fr\/wordpress\/?p=4413\">donn\u00e9es au repos<\/a> c&rsquo;est important, mais s\u00e9curiser les flux l&rsquo;est tout autant.<\/p>\n<p>Donc, apr\u00e8s une petite synth\u00e8se sur <a href=\"http:\/\/www.laurentmarot.fr\/wordpress\/?p=4413\">Data-at-Rest Encryption<\/a> avec Transparent Data Encryption, voyons comment mettre un peu de confidentialit\u00e9 dans le transport.<\/p>\n<p>Un peu de cuisine pour commencer &#8230; En ces temps de confinement, cet article servira de support \u00e0 un TP que nous jouerons avec les LP DLIS de l&rsquo;IUT de Vannes semaine prochaine.<\/p>\n<p>On va ouvrir un acc\u00e8s sur une base MariaDB expos\u00e9e sur Internet &#8230; ouais, on des fous \ud83d\ude42<\/p>\n<p>Bon, on va quand m\u00eame avant toute chose activer les logs sur le fameux SGBD histoire de voir qui attaque sans passer par un proxy. Attention malgr\u00e9 tout car dans les fameux fichiers de logs on retrouve aussi en particulier, les requ\u00eates de cr\u00e9ation de comptes avec si on n&rsquo;y prends pas garde le mot de passe en clair (et accessoirement toutes les commandes pourries)\u00a0 :<\/p>\n<div id=\"attachment_4457\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-22-43.png\" rel=\"lightbox[4441]\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4457\" class=\"size-medium wp-image-4457\" src=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-22-43-300x68.png\" alt=\"logs mariaDB\" width=\"300\" height=\"68\" srcset=\"https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-22-43-300x68.png 300w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-22-43-768x175.png 768w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-22-43.png 946w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4457\" class=\"wp-caption-text\">logs mariaDB<\/p><\/div>\n<p>root@vpsxxxxxx:\/etc\/mysql\/mariadb.conf.d# ls \/var\/log\/mysql\/mysql.log -lart<br \/>\n-rw-rw&#8212;- 1 mysql adm 182 Mar 27 11:56 \/var\/log\/mysql\/mysql.log<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Pour faire les choses un petit peu s\u00e9rieusement, on n&rsquo;ouvrira qu&rsquo;une base sur internet avec un seul compte d\u00e9di\u00e9 cr\u00e9\u00e9 pour l&rsquo;occasion, histoire d&rsquo;avoir un peu de cloisonnement.<\/p>\n<p>Forc\u00e9ment et heureusement, dans un premier temps \u00e7a ne passe pas. Il faut modifier la configuration par d\u00e9faut qui n&rsquo;autorise que les connexions depuis le poste local.<\/p>\n<div id=\"attachment_4455\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-30-36.png\" rel=\"lightbox[4441]\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4455\" class=\"size-medium wp-image-4455\" src=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-30-36-300x130.png\" alt=\"can't connect to mariaDB\" width=\"300\" height=\"130\" srcset=\"https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-30-36-300x130.png 300w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-30-36-1024x445.png 1024w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-30-36-768x334.png 768w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-30-36.png 1430w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4455\" class=\"wp-caption-text\">can&rsquo;t connect to mariaDB<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Et puis, apr\u00e8s quelques efforts, la connexion peut enfin \u00eatre \u00e9tablie&#8230;<\/p>\n<div id=\"attachment_4453\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-51-42.png\" rel=\"lightbox[4441]\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4453\" class=\"size-medium wp-image-4453\" src=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-51-42-300x41.png\" alt=\"mysql from everywher for everyone\" width=\"300\" height=\"41\" srcset=\"https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-51-42-300x41.png 300w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-27-13-51-42.png 624w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4453\" class=\"wp-caption-text\">mysql from everywher for everyone<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Faudrait pas croire que votre mot de passe circule en clair (contrairement au trafic suivant l&rsquo;authentification) .<\/p>\n<p>Il se dit que le mot de passe suivrait\u00a0 le m\u00e9canisme de chiffrement d\u00e9taill\u00e9 ici\u00a0 :<\/p>\n<p><a href=\"https:\/\/dev.mysql.com\/doc\/dev\/mysql-server\/latest\/page_protocol_connection_phase_authentication_methods_native_password_authentication.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/dev.mysql.com\/doc\/dev\/mysql-server\/latest\/page_protocol_connection_phase_authentication_methods_native_password_authentication.html<\/a><\/p>\n<p>Malheureusement, \u00e0 cet instant (20200329151524) je n&rsquo;arrive pas \u00e0 retrouver dans mon pcap les 20 octets de nonce (on nous ment ?)<\/p>\n<div id=\"attachment_4461\" style=\"width: 266px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/inline_umlgraph_45.png\" rel=\"lightbox[4441]\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4461\" class=\"size-full wp-image-4461\" src=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/inline_umlgraph_45.png\" alt=\"Scramble data\" width=\"256\" height=\"164\" \/><\/a><p id=\"caption-attachment-4461\" class=\"wp-caption-text\">Scramble data<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Bref, quoi, qu&rsquo;il en soit et au del\u00e0 de la v\u00e9rification de l&rsquo;impl\u00e9mentation de ce m\u00e9canisme, revenons au chiffrement du flux &#8230;<\/p>\n<h2>Etape 1 \u2013 Cr\u00e9er le certificat racine de l&rsquo;autorit\u00e9 de certification (CA)<\/h2>\n<p>&nbsp;<\/p>\n<p>Cr\u00e9ons un dossier tls dans le r\u00e9pertoire \/etc\/mysql\/\u00a0 (parce que ssl c&rsquo;est tellement vingti\u00e8me si\u00e8cle):<\/p>\n<p><code>$ cd \/etc\/mysql<br \/>\n$ sudo mkdir tls<br \/>\n$ cd tls<\/code><\/p>\n<p><code><\/code><\/p>\n<p class=\"note\"><strong>Note<\/strong>: La valeur du Common Name (CN) utilis\u00e9e pour les certificats serveur MariaDB et le client doivent \u00eatre diff\u00e9rents du Common Name utilis\u00e9 pour le certificat racine de l&rsquo;autorit\u00e9 de certification. Pour \u00e9viter tour probl\u00e8me, j&rsquo;ai utilis\u00e9 les valeurs suivantes :<br \/>\nCommon Name de la CA : <strong>MariaDB admin<\/strong><br \/>\nCommon Name du serveur : <strong>MariaDB server<\/strong><br \/>\nCommon Name du client : <strong>MariaDB client<\/strong><\/p>\n<p>Dans la vraie vie, la CA serait h\u00e9berg\u00e9e sur une autre machine.<\/p>\n<p><strong>G\u00e9n\u00e9ration de la paire de clefs RSA<br \/>\n<\/strong><\/p>\n<p><code>$ sudo openssl genrsa 2048 &gt; BZHITSCA-key.pem<\/code><\/p>\n<p><strong>G\u00e9n\u00e9ration du certificat de la clef publique<\/strong> ( tip : pour \u00eatre tr\u00e8s pr\u00e9cis, on parle donc de certificat <strong>DE<\/strong> clef publique)<\/p>\n<p><code>$ sudo openssl req -new -x509 -nodes -days 365000 -key BZHITSCA-key.pem -out BZHITSCA-cert.pem<\/code><\/p>\n<p>On lui donne une validit\u00e9 de 1 000 ans, ce qui nous donnera le temps de jouer.<\/p>\n<p>&nbsp;<\/p>\n<p>Par abus de langage on associe souvent la commande pr\u00e9c\u00e9dente \u00e0 une simple g\u00e9n\u00e9ration de clef priv\u00e9e. Mais en fait le fichier .pem produit permet aussi d&rsquo;exporter la clef publique.<\/p>\n<p><code>$ sudo openssl rsa -in BZHITSCA-key.pem -pubout -out BZHITSCA-pubkey.pem<\/code><\/p>\n<h2><\/h2>\n<h2>Etape 2 \u2013 Cr\u00e9er le certificat du serveur MariaDB<\/h2>\n<p><strong>G\u00e9n\u00e9ration de la clef et de la Certificate Signing Request<\/strong><\/p>\n<p><code>$ sudo openssl req -newkey rsa:2048 -days 365 -nodes -keyout SERVER-key.pem -out SERVER-req.pem<\/code><\/p>\n<p>Le deuxi\u00e8me objet cr\u00e9\u00e9 est la requ\u00eate de demande de signature de certificat (Certificate Signing Request = CSR). Donc, g\u00e9n\u00e9ralement on peut dire qu&rsquo;un certificat c&rsquo;est un fichier contenant des \u00ab\u00a0informations\u00a0\u00bb relatives \u00e0 une entit\u00e9 et la clef publique de cette m\u00eame entit\u00e9 ayant subi une signature num\u00e9rique par l&rsquo;autorit\u00e9 de certification (qui certifie donc que la clef publique repr\u00e9sente bien l&rsquo;entit\u00e9 en question). Capito ?<\/p>\n<p><strong>Export de la clef RSA<br \/>\n<\/strong><\/p>\n<p><code>$ sudo openssl rsa -in SERVER-key.pem -out SERVER-key.pem<\/code><\/p>\n<p><strong>Signature du certificat du serveur<\/strong><\/p>\n<p><code>$ sudo openssl x509 -req -in SERVER-req.pem -days 365000 -CA BZHITSCA-cert.pem -CAkey BZHITSCA-key.pem -set_serial 01 -out SERVER-cert.pem<\/code><\/p>\n<h2>Etape 3 \u2013 G\u00e9n\u00e9rer les certificats du client<\/h2>\n<p><strong>G\u00e9n\u00e9ration de la clef et de la Certificate Signing Request<\/strong><\/p>\n<pre><code class=\"language-bash hljs\"><\/code><\/pre>\n<p><code>$ sudo openssl req -newkey rsa:2048 -days 365 -nodes -keyout SERVER-key.pem -out SERVER-req.pem<\/code><\/p>\n<pre><code class=\"language-bash hljs\"><\/code><\/pre>\n<p>Le deuxi\u00e8me objet cr\u00e9\u00e9 est la requ\u00eate de demande de signature de certificat (Certificate Signing Request = CSR). Donc, g\u00e9n\u00e9ralement on peut dire qu&rsquo;un certificat c&rsquo;est un fichier contenant des \u00ab\u00a0informations\u00a0\u00bb relatives \u00e0 une entit\u00e9 et la clef publique de cette m\u00eame entit\u00e9 ayant subi une signature num\u00e9rique par l&rsquo;autorit\u00e9 de certification (qui certifie donc que la clef publique repr\u00e9sente bien l&rsquo;entit\u00e9 en question). Capito ?<\/p>\n<pre><code class=\"language-bash hljs\"><\/code><\/pre>\n<p><strong>Export de la clef RSA<br \/>\n<\/strong><\/p>\n<pre><code class=\"language-bash hljs\"><\/code><\/pre>\n<p><code>$ sudo openssl rsa -in SERVER-key.pem -out SERVER-key.pem<\/code><\/p>\n<pre><code class=\"language-bash hljs\"><\/code><\/pre>\n<p><strong>Signature du certificat du serveur<\/strong><\/p>\n<pre><code class=\"language-bash hljs\"><\/code><\/pre>\n<p><code>$ sudo openssl x509 -req -in SERVER-req.pem -days 365000 -CA BZHITSCA-cert.pem -CAkey BZHITSCA-key.pem -set_serial 01 -out SERVER-cert.pem<\/code><\/p>\n<pre><code class=\"language-bash hljs\"><\/code><\/pre>\n<h2>Etape 4 \u2013 Copier les certificats sur le client<\/h2>\n<p><strong>Configuration du client<\/strong><\/p>\n<pre><code class=\"language-bash hljs\">mkdir \/etc\/mysql\/client-ssl &amp;&amp; <span class=\"hljs-built_in\">cd<\/span> \/etc\/mysql\/client-ssl\r\n\r\n<span class=\"hljs-comment\"># Copy the following files: CLIENT-cert.pem, CLIENT-key.pem and BZHITSCA-cert.pem<\/span>\r\nscp root@REMOTE_SERVER_IP:~\/cert\/{client-cert.pem,client-key.pem,ca-cert.pem} .\/\r\n\r\nchmod -R 700 \/etc\/mysql\/client-ssl\r\n<\/code><\/pre>\n<p>Editer <code>my.cnf<\/code> pour configurer les chemins vers les certificats:<\/p>\n<pre><code class=\"language-bash hljs\">nano \/etc\/mysql\/my.cnf<\/code><\/pre>\n<p>et ajouter:<\/p>\n<pre><code class=\"hljs javascript\">[client]\r\nssl-ca =   <span class=\"hljs-regexp\">\/etc\/my<\/span>sql\/client-ssl\/ca-cert.pem\r\nssl-cert = <span class=\"hljs-regexp\">\/etc\/my<\/span>sql\/client-ssl\/client-cert.pem\r\nssl-key =  <span class=\"hljs-regexp\">\/etc\/my<\/span>sql\/client-ssl\/client-key.pem\r\n<\/code><\/pre>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2>Etape 5 \u2013 Configurer le serveur MariaDB<\/h2>\n<p>Editer\u00a0 le fichier \/etc\/mysql\/mariadb.conf.d\/50-server.cnf ou bien \/etc\/mysql\/mariadb.cnf comme suit:<\/p>\n<p><code>$ sudo vi \/etc\/mysql\/mariadb.conf.d\/50-server.cnf<\/code><\/p>\n<p>Ajouter dans le bloc [mysqld]:<\/p>\n<div class=\"wp_syntax\">\n<table>\n<tbody>\n<tr>\n<td class=\"code\">\n<pre class=\"ini\">### MySQL Server ###\r\n## Securing the Database with ssl option and certificates ##\r\n## There is no control over the protocol level used. ##\r\n##  mariadb will use TLSv1.0 or better.  ##\r\nssl\r\nssl-ca=\/etc\/mysql\/ssl\/ca-cert.pem\r\nssl-cert=\/etc\/mysql\/ssl\/server-cert.pem\r\nssl-key=\/etc\/mysql\/ssl\/server-key.pem<\/pre>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Savegarder le fichier etred\u00e9marrer mariadb :<br \/>\n<code>$ sudo \/etc\/init.d\/mysql restart<\/code><\/p>\n<h2><\/h2>\n<h2>Etape 6 \u2013 Cr\u00e9er un nouvel utilisateur et se connecter<\/h2>\n<p>&nbsp;<\/p>\n<pre><code class=\"language-sql hljs\"><span class=\"hljs-keyword\">CREATE<\/span> <span class=\"hljs-keyword\">USER<\/span> <span class=\"hljs-string\">'secure_user'<\/span>@<span class=\"hljs-string\">'%'<\/span> <span class=\"hljs-keyword\">IDENTIFIED<\/span> <span class=\"hljs-keyword\">BY<\/span> <span class=\"hljs-string\">'my_password'<\/span>;\r\n<span class=\"hljs-keyword\">GRANT<\/span> ALL <span class=\"hljs-keyword\">PRIVILEGES<\/span> <span class=\"hljs-keyword\">ON<\/span> votre_base.* <span class=\"hljs-keyword\">TO<\/span> securee_user@<span class=\"hljs-string\">'%'<\/span> REQUIRE SSL;\r\n<span class=\"hljs-keyword\">FLUSH<\/span> <span class=\"hljs-keyword\">PRIVILEGES<\/span>;\r\n<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>Vous pouvez alors en principe vous connecter avec TLS:<\/p>\n<pre><code class=\"language-sql hljs\">mysql -h REMOTE_SERVER_IP -u remote_user -p\"my_password\"\r\nWelcome to the MariaDB monitor.  Commands <span class=\"hljs-keyword\">end<\/span> <span class=\"hljs-keyword\">with<\/span> ; or \\g.\r\nYour MariaDB connection id is 5\r\nServer version: 10.1.26-MariaDB-0+deb9u1 Debian 9.1\r\n\r\nCopyright (c) 2000, 2017, Oracle, MariaDB Corporation Ab and others.\r\n\r\nType '<span class=\"hljs-keyword\">help<\/span>;' or '\\h' for help. <span class=\"hljs-keyword\">Type<\/span> <span class=\"hljs-string\">'\\c'<\/span> <span class=\"hljs-keyword\">to<\/span> <span class=\"hljs-keyword\">clear<\/span> the <span class=\"hljs-keyword\">current<\/span> <span class=\"hljs-keyword\">input<\/span> statement.\r\n\r\nMariaDB [(<span class=\"hljs-keyword\">none<\/span>)]&gt; Bye\r\n<\/code><\/pre>\n<p>&nbsp;<\/p>\n<p>Pour m\u00e9moire (pas mal de liens qui m&rsquo;ont permis de comprendre) :<\/p>\n<p>https:\/\/stackoverflow.com\/questions\/38167587\/how-to-use-wireshark-to-capture-mysql-query-sql-clearly<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Ca3cKFLbpZ\"><p><a href=\"https:\/\/dbtut.com\/index.php\/2018\/11\/15\/how-to-get-the-data-packets-between-mysql-client-and-server\/\">How to get the network packets between MySQL client and server?<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to get the network packets between MySQL client and server?&#8221; &#8212; Database Tutorials\" src=\"https:\/\/dbtut.com\/index.php\/2018\/11\/15\/how-to-get-the-data-packets-between-mysql-client-and-server\/embed\/#?secret=Ca3cKFLbpZ\" data-secret=\"Ca3cKFLbpZ\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><br \/>\ntcpdump -nnei any port 3306 -w tmp.pcap<br \/>\nhttps:\/\/dev.mysql.com\/doc\/dev\/mysql-server\/latest\/page_protocol_connection_phase_authentication_methods_native_password_authentication.html<\/p>\n<p>http:\/\/databaseblog.myname.nl\/2017\/03\/network-attacks-on-mysql-part-1.html<\/p>\n<p>https:\/\/www.cyberciti.biz\/faq\/how-to-setup-mariadb-ssl-and-secure-connections-from-clients\/<\/p>\n<p>https:\/\/www.gab.lc\/articles\/mysql_with_ssl\/<\/p>\n<div id=\"attachment_4450\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-14-59.png\" rel=\"lightbox[4441]\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4450\" class=\"size-medium wp-image-4450\" src=\"http:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-14-59-300x168.png\" alt=\"capture wireshark\" width=\"300\" height=\"168\" srcset=\"https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-14-59-300x168.png 300w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-14-59-1024x575.png 1024w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-14-59-768x431.png 768w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-14-59-1536x862.png 1536w, https:\/\/www.laurentmarot.fr\/wordpress\/wp-content\/uploads\/2020\/03\/Capture-du-2020-03-28-10-14-59.png 1919w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-4450\" class=\"wp-caption-text\">capture wireshark<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>S\u00e9curiser les donn\u00e9es au repos c&rsquo;est important, mais s\u00e9curiser les flux l&rsquo;est tout autant. Donc, apr\u00e8s une petite synth\u00e8se sur Data-at-Rest Encryption avec Transparent Data Encryption, voyons comment mettre un peu de confidentialit\u00e9 dans le transport. Un peu de cuisine pour commencer &#8230; En ces temps de confinement, cet article servira de support \u00e0 un [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"_links":{"self":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4441"}],"collection":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4441"}],"version-history":[{"count":40,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4441\/revisions"}],"predecessor-version":[{"id":4779,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4441\/revisions\/4779"}],"wp:attachment":[{"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.laurentmarot.fr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}