Re: XTS cipher mode for cluster file encryption
От | Tomas Vondra |
---|---|
Тема | Re: XTS cipher mode for cluster file encryption |
Дата | |
Msg-id | 57935ba1-a08e-480f-2e27-d8bbfd9bf261@enterprisedb.com обсуждение исходный текст |
Ответ на | Re: XTS cipher mode for cluster file encryption (Stephen Frost <sfrost@snowman.net>) |
Ответы |
Re: XTS cipher mode for cluster file encryption
|
Список | pgsql-hackers |
On 10/18/21 17:56, Stephen Frost wrote: >> ... >> I've argued for storing the nonce, but I don't quite see why would we need >> integrity guarantees? >> >> AFAICS the threat model the patch aims to address is an attacker who can >> observe the data (e.g. a low-privileged OS user), but can't modify the >> files. Which seems like a reasonable model for shared environments. > > There are multiple threat models which we should be considering and > that's why we may want to eventually add integrity. > So what are these threat models? If we should be considering them it'd be nice to have a description, explaining what capabilities must the attacker have ... My (perhaps naive) understanding is that the authentication / integrity provides (partial) protection against attackers that may modify instance data - modify files, etc. But I'd guess an attacker with such capability can do various other (simpler) things to extract data. Say, modify the config to load an extension that dumps keys from memory, or whatever. So what's a plausible / practical threat model that would be mitigated by the authenticated encryption? It'd be a bit silly to add complexity to allow AEAD, only to find out there are ways around it. regards -- Tomas Vondra EnterpriseDB: http://www.enterprisedb.com The Enterprise PostgreSQL Company
В списке pgsql-hackers по дате отправления: