Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS)
От | Alvaro Herrera |
---|---|
Тема | Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS) |
Дата | |
Msg-id | 20190705194628.GA4316@alvherre.pgsql обсуждение исходный текст |
Ответ на | Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS) (Bruce Momjian <bruce@momjian.us>) |
Ответы |
Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS)
Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS) |
Список | pgsql-hackers |
On 2019-Jul-05, Bruce Momjian wrote: > What people really want with more-granular-than-cluster encryption is > the ability to supply their passphrase key _when_ they want to access > their data, and then leave and be sure their data is secure from > decryption. That will not be possible since the WAL will be encrypted > and any replay of it will need their passphrase key to unlock it, or the > entire system will be unrecoverable. I'm not sure I understand why WAL replay needs the passphrase to work. Why isn't the data saved in WAL already encrypted, which can be applied as raw bytes to each data block, without needing to decrypt anything? Only if somebody wants to interpret the bytes they need the passphrase, no? -- Álvaro Herrera https://www.2ndQuadrant.com/ PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services
В списке pgsql-hackers по дате отправления: