Re: Transparent Data Encryption (TDE) and encrypted files
От | Tels |
---|---|
Тема | Re: Transparent Data Encryption (TDE) and encrypted files |
Дата | |
Msg-id | 83bc1d0e183ddace52cbfcb4fb0c1d0d@bloodgate.com обсуждение исходный текст |
Ответ на | Transparent Data Encryption (TDE) and encrypted files (Bruce Momjian <bruce@momjian.us>) |
Ответы |
Re: Transparent Data Encryption (TDE) and encrypted files
Re: Transparent Data Encryption (TDE) and encrypted files |
Список | pgsql-hackers |
Moin, On 2019-09-30 23:26, Bruce Momjian wrote: > For full-cluster Transparent Data Encryption (TDE), the current plan is > to encrypt all heap and index files, WAL, and all pgsql_tmp (work_mem > overflow). The plan is: > > https://wiki.postgresql.org/wiki/Transparent_Data_Encryption#TODO_for_Full-Cluster_Encryption > > We don't see much value to encrypting vm, fsm, pg_xact, pg_multixact, > or > other files. Is that correct? Do any other PGDATA files contain user > data? IMHO the general rule in crypto is: encrypt everything, or don't bother. If you don't encrypt some things, somebody is going to find loopholes and sidechannels and partial-plaintext attacks. Just a silly example: If you trick the DB into putting only one row per page, any "bit-per-page" map suddenly reveals information about a single encrypted row that it shouldn't reveal. Many people with a lot of free time on their hands will sit around, drink a nice cup of tea and come up with all sorts of attacks on these things that you didn't (and couldn't) anticipate now. So IMHO it would be much better to err on the side of caution and encrypt everything possible. Best regards, Tels
В списке pgsql-hackers по дате отправления: