Some info:
-Small application using a SQLite encrypted database
-Using Dotfuscator Community Edition I still can take a look inside of the code (even with methods's names obfuscated)
sQliteConnection.SetPassword("Password=ThisIsMySuperSecretPassword");
-I don´t need a high level of protection about the code itself (the logic), but I need to protect the database password
If I use some concatenation like
PartA = "ThisIs"
PartB= "MySuper"
PartC= "SecretPassword"
Password = PartA + PartB + PartC
With the 4 lines not together on the code, maybe I can have a minimun of protection
Now I can to go a step further with something like this:
PartA = "Tehtibs5Iasu"
PartB= "M4ytS6uhpae3r5"
PartC= "S5efc2rhe8taP3ags5sgw4ogr5d6"
So I have one valid character and one invalid character only to confuse the eventual lurker. I will use a For loop to "decrypt" each part
How much secure can be a solution like this?
Is there other tricks to protect a password inside the code?
Is there other tricks to protect a password inside the code?
Yes
(If by 'tricks' you mean alternate means to supply passwords and use connection strings).
Note that you cannot keep something secret on someone's PC. But with a SQLite DB in particular, you can make it fairly difficult to snatch the connection string...by not storing a connection string. The demo DB for this will use the password: '
'. That is, it will use a binary password.
A Class with all Shared methods is used to manage the connection:
SQLite
allows binary passwords which this implements.Guid.ToByteArray()
or the result of a Crypto Hash of something. Both of those would be a bit easier to reproduce outside your code.New SQLiteConnection
, but I dont see any advantage in that.Usage
First, set the password image somewhere (remember, everything is
static
/Shared
):Note that each time you reference something like
My.Resources.ballorange
a brand new image object is created. You only need to set thePasswordImg
once ever. If you were to change the code to accept the image as an argument, you run the risk of leaking resources as a side effect of creating connections.Create DB
I would avoid creating the DB on the client machine. If they are supplied with an empty but encrypted DB file as part of installation, it reduces the ease of patching your code to never encrypt it in the first place. Just distribute a blank like any other data file, installing it to the desired path.
Not many SQLite browser tools support encryption though, so you may need the above to apply that encryption.
Write To DB
Read DB
It works fine:
It is not fool proof, they can use
ILSpy
or other decompiler to see what you are doing, but that will always be the case with a NET app. However, thats just the first hurdle - they also need to work out how to get that runtime data.When you issue updates/bug fixes you could also change the password by using a different image, changing a few pixels, or altering the methods slightly (convert the byte array to a Base64 string for example).
It is certainly better then security by obscurity (concatenating strings) and may suffice for what you are trying to do.