Re: Regd. the Implementation of Wallet (in Oracle) config equivalent in postgreSQL whilst the database migration

From: Rainer Duffner <rainer(at)ultra-secure(dot)de>
To: "Peter J(dot) Holzer" <hjp-pgsql(at)hjp(dot)at>
Cc: pgsql-general(at)lists(dot)postgresql(dot)org
Subject: Re: Regd. the Implementation of Wallet (in Oracle) config equivalent in postgreSQL whilst the database migration
Date: 2022-12-22 10:15:57
Message-ID: 08F69776-6702-41F4-ACA5-CABF74CFE115@ultra-secure.de
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

> Am 22.12.2022 um 10:46 schrieb Peter J. Holzer <hjp-pgsql(at)hjp(dot)at>:
>
> If the hacker has root access: What prevents them from talking to the
> HSM?

I wasn’t involved in setting it up here, but AFAIK you need to „enroll“ the client to the HSM.

That is a one-time process that requires HSM credentials (via certificates and pass-phrases).

Then, that client can talk to the HSM.

The HSM-client is (or should be) engineered in such a way that you can’t extract the encryption-secret easily.

I am not sure, but IIRC, you should not even be able to clone the VM without the HSM noticing or the clone not working at all to begin with (for lack of enrollment). Though most production databases are too large to just „clone“.

Maybe someone who knows more about this subject can chime in before I make a fool of myself?
;-)

Rainer

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message hamann.w 2022-12-22 11:37:22 trouble writing plpgsql
Previous Message Peter J. Holzer 2022-12-22 09:46:22 Re: Regd. the Implementation of Wallet (in Oracle) config equivalent in postgreSQL whilst the database migration