6.1.1 Security Guidelines安全指南

Anyone using MySQL on a computer connected to the Internet should read this section to avoid the most common security mistakes.任何在连接到Internet的计算机上使用MySQL的人都应该阅读本节,以避免最常见的安全错误。

In discussing security, it is necessary to consider fully protecting the entire server host (not just the MySQL server) against all types of applicable attacks: eavesdropping, altering, playback, and denial of service. 在讨论安全性时,有必要考虑充分保护整个服务器主机(而不仅仅是MySQL服务器)免受所有类型的适用攻击:窃听、更改、播放和拒绝服务。We do not cover all aspects of availability and fault tolerance here.我们在这里没有涵盖可用性和容错的所有方面。

MySQL uses security based on Access Control Lists (ACLs) for all connections, queries, and other operations that users can attempt to perform. There is also support for SSL-encrypted connections between MySQL clients and servers. Many of the concepts discussed here are not specific to MySQL at all; the same general ideas apply to almost all applications.MySQL对用户可以尝试执行的所有连接、查询和其他操作使用基于访问控制列表(ACL)的安全性。MySQL客户端和服务器之间还支持SSL加密连接。这里讨论的许多概念根本不是MySQL特有的;相同的一般思想适用于几乎所有的应用程序。

When running MySQL, follow these guidelines:运行MySQL时,请遵循以下准则: