Re: PROPOSAL: make PostgreSQL sanitizers-friendly (and prevent information disclosure)
От | Noah Misch |
---|---|
Тема | Re: PROPOSAL: make PostgreSQL sanitizers-friendly (and prevent information disclosure) |
Дата | |
Msg-id | 20160820192910.GA2955946@tornado.leadboat.com обсуждение исходный текст |
Ответ на | Re: Re: PROPOSAL: make PostgreSQL sanitizers-friendly (and prevent information disclosure) (Tom Lane <tgl@sss.pgh.pa.us>) |
Ответы |
Re: Re: PROPOSAL: make PostgreSQL sanitizers-friendly (and prevent information disclosure)
|
Список | pgsql-hackers |
On Fri, Aug 19, 2016 at 07:22:02PM -0400, Tom Lane wrote: > Andres Freund <andres@anarazel.de> writes: > > On 2016-08-19 17:55:25 -0400, Tom Lane wrote: > >> It'd be useful also to figure out why our existing valgrind testing has > >> not caught this already. The example you give looks like it surely > >> ought to be replicated well enough in the standard regression tests. > > > The valgrind suppression file explicitly hides a bunch of padding > > issues. > > So maybe we ought to work towards taking those out? Maybe. It's a policy question boiling down to our willingness to spend cycles zeroing memory in order to limit trust in the confidentiality of storage backing the data directory. Think of "INSERT INTO t VALUES(my_encrypt('key', 'cleartext'))", subsequent to which bits of the key or cleartext leak to disk by way of WAL padding bytes. A reasonable person might expect that not to happen; GNU Privacy Guard and a few like-minded programs prevent it. I'm on the fence regarding whether PostgreSQL should target this level of vigilance. An RDBMS is mainly a tool for managing persistent data, and PostgreSQL will never be a superior tool for data that _must not_ persist. Having said that, the runtime cost of zeroing memory and the development cost of reviewing the patches to do so is fairly low.
В списке pgsql-hackers по дате отправления: