Hi John
You are correct. However we would like to combat a potential risk of just the database being compromised. Many WP sites use third party backup tools (say BackupBuddy, VaultPress, CodeGuard), to keep a snapshot of the database somewhere safe in case the server suffers a fault or something fatal happens to the server. If the third party is being attacked and the database downloaded, the attackers would easily be able to find the unencrypted CF credentials. Another scenario would be with shared hosts not keeping their servers secure or a remote database server that is compromised.
The simplest solution would be using one of the salt values in the wp-config.php to encrypt/decrypt the credentials. If attacks managed to break into the database and not the filesystem, they would only be able to see the encrypted information and not be able to access the salt-keys they would require to decrypt the credentials.
Thanks
-
This reply was modified 7 years, 3 months ago by mclaurent.
-
This reply was modified 7 years, 3 months ago by mclaurent.