Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS)
От | Bruce Momjian |
---|---|
Тема | Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS) |
Дата | |
Msg-id | 20190817151459.GB32736@momjian.us обсуждение исходный текст |
Ответ на | Re: [Proposal] Table-level Transparent Data Encryption (TDE) and Key Management Service (KMS) (Antonin Houska <ah@cybertec.at>) |
Ответы |
Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS)
|
Список | pgsql-hackers |
On Sat, Aug 17, 2019 at 08:16:06AM +0200, Antonin Houska wrote: > Bruce Momjian <bruce@momjian.us> wrote: > > > On Thu, Aug 15, 2019 at 09:01:05PM -0400, Stephen Frost wrote: > > > * Bruce Momjian (bruce@momjian.us) wrote: > > > > Why would it not be simpler to have the cluster_passphrase_command run > > > > whatever command-line program it wants? If you don't want to use a > > > > shell command, create an executable and call that. > > > > > > Having direct integration with a KMS would certainly be valuable, and I > > > don't see a reason to deny users that option if someone would like to > > > spend time implementing it- in addition to a simpler mechanism such as a > > > passphrase command, which I believe is what was being suggested here. > > > > OK, I am just trying to see why we would not use the > > cluster_passphrase_command-like interface to do that. > > One problem that occurs to me is that PG may need to send some sort of > credentials to the KMS. If it runs a separate process to execute the command, > it needs to pass those credentials to it. Whether it does so via parameters or > environment variables, both can be seen by other users. Yes, that would be a good reason to use an external library, if we can't figure out a clean API like opening a pipe into the command-line tool and piping in the secret. -- Bruce Momjian <bruce@momjian.us> http://momjian.us EnterpriseDB http://enterprisedb.com + As you are, so once was I. As I am, so you will be. + + Ancient Roman grave inscription +
В списке pgsql-hackers по дате отправления: