V6.3-000 brings significant enhancements to GT.M's use of encryption. One defensive technique is to reduce the "surface" available to an attacker. V6.3-000 reduces the surface in several ways.
An attacker with the wherewithal for a brute-force attack on encryption can in theory benefit from the voluminous, long-lived, and structurally similar data in a typical application database, such as financial transactions and medical records. One component of a traditional layered defense-in-depth is to change the actual encryption keys periodically. By enabling encryption keys for database files to be changed "on the fly" while a database is in use (GTM-6310), V6.3-000 operationally simplifies changing the keys, and makes key changes less prone to human error. The prior technique required database regions to be extracted and loaded into newly created database files with keys different from those of their predecessors. Context-sensitive initialization vectors (IVs) in database, journal, extract and bytestream backup files (GTM-8117) further reduce the surface for a brute-force attack.
A properly configured Transport Layer Security (TLS; formerly known as SSL) session is required to secure a TCP connection. However, an attacker that can record a TCP session, and with the wherewithal for a brute force attack, or with more affordable future computing power, can in theory retroactively break into and eavesdrop on the recorded session. Periodically renegotiating the session key (GTM-8302) means that an attacker who succeeds in breaking a key can only eavesdrop on that part of the session - every renegotiation generates a new key that must be separately broken.
V6.3-000 also brings a number of useful enhancements, as well as other improvements. For example:Please use V6.3-000 and
tell us what you think. Thank you for using GT.M.
Regards
-- Bhaskar
GT.M - Rock solid. Lightning fast. Secure. Pick any three.
--
You received this message because you are subscribed to the Google Groups "VistA" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vista+un...@googlegroups.com.
To post to this group, send email to vi...@googlegroups.com.
Visit this group at https://groups.google.com/group/vista.
For more options, visit https://groups.google.com/d/optout.
WOW! This ought to make more people interested in taking the Hacking GT.M course that will be offered before the VistA Community Meeting (and will soon be formally announced)!
--
Nancy Anthracite
> * Parallelization speeds MUPIP JOURNAL RECOVER/ROLLBACK operations
> (GTM-5007).
> * For a replicated database even of an application that does not use
> transaction processing, MUPIP JOURNAL -ROLLBACK -FORWARD applies
> updates from a set of journal files to the restored backup of a
> multi-region database, bringing it to the same state that MUPIP
> JOURNAL -ROLLBACK -BACKWARD would when performed on the original
> database, providing the same consistency across regions that the
> MUPIP JOURNAL -ROLLBACK provides (GTM-7291).
> * Faster database exit, especially with large numbers of processes and
> databases with many regions (GTM-6301).
> * Evaluation of certain string literal operations during compilation
> rather than execution (GTM-7762andGTM-8404).
> * Concurrent access by more than 32,767 processes to a database file
> (GTM-8137).
> * Significant performance improvements for certain UTF-8 mode use cases
Intrinsic functions that use numeric arguments actually constructed using compile-time optimizations to resolve expressions consisting entirely of literals for concatenation and some string functions work as documented. In V6.3-000, odd source code such as $ORDER(xxx,"-"_"1"), where xxx is any legal first argument produced errors such as GTM-E-ORDER2. Not invoking the optimization by avoiding the operation with literal operands worked correctly - e.g., $ORDER(xxx,"-1") - as did any operation that coerced the result - e.g., $ORDER(xxx,"-"_"1"+0). (GTM-8540)
$TEXT(x) where x is a label works correctly when there is a label xyz in the current routine (a) preceding label x and (b) where x is a leading substring of xyz. In V6.3-000, $TEXT(x) would under these circumstances incorrectly provide the source code $TEXT(xyz). (GTM-8549)