Skip site navigation (1) Skip section navigation (2)

Re: RFE: Transparent encryption on all fields

From: tomas(at)tuxteam(dot)de
To: Sam Halliday <sam(dot)halliday(at)gmail(dot)com>
Cc: Bill Moran <wmoran(at)potentialtech(dot)com>, pgsql-hackers(at)postgresql(dot)org
Subject: Re: RFE: Transparent encryption on all fields
Date: 2009-04-26 06:05:27
Message-ID: 20090426060527.GA4574@tomas (view raw, whole thread or download thread mbox)
Lists: pgsql-hackers
Hash: SHA1

On Sat, Apr 25, 2009 at 11:43:14AM +0100, Sam Halliday wrote:
> Please continue to CC me on this thread as I have disabled receiving 
> messages from this list, although remain subscribed.



> Remember, the threat case here is a stolen server/desktop/laptop which is 
> either completely locked down or has been powered off. The secure 
> transmission of keys is someone else's problem.
> This is essentially a proposal to get around the limitations imposed by 
> running PostgreSQL on an encrypted partition. The requirements are the 
> following, regardless of how it is implemented:-
> - data for selected databases/columns are stored encrypted on disc, 
> passwords not persisted (although may remain in RAM)

An encrypted partition does most of this (except the "selected columns"
part). Note that encrypting the column most probably will make it
impossible to put an index on that).

so it's +1 for encrypted column.

> - a single psql server can autonomously start up and serve connection 
> requests (this cannot be done with encrypted disc)

Sure it can -- it will be strongly architecture dependent though. Look
at [1] for an example of how this might be done for the _root partition_
in GNU/Linux (it'll be easier for a dedicated partition, when all else
is up and running).

> - client PSQL queries must remain unchanged (connection request may have 
> additional parameters)

Same with encrypted partition.

> - minimal performance penalty, no more than running on top of an encrypted 
> drive

Same with encrypted partition.

> Of course if an intruder has physical access to the device AND the keys, 
> then all is lost. That is always the case. But that's 2 intrusions they 
> must make.

Same with encrypted partition.

There is another advantage of encrypted column mentioned upthread (and I
think it's the main one): each user can unlock her specific data set.
This is cute, but I still think it can be better addressed doing the
decryption client-side (and I maintain that this is _at least as
secure_, possibly even more secure). A drawback would be that each
client would need its own implementation. For the libpq based clients
there is e.g. libpqtypes [2], but non-libpq based (notably Java) would
have to implement that themselves.

I'm still firmly on the camp of "client side", it seems.

[1] <>
[2] <>

- -- tomás
Version: GnuPG v1.4.6 (GNU/Linux)


In response to


pgsql-hackers by date

Next:From: Magnus HaganderDate: 2009-04-26 06:51:59
Subject: Re: Randomly placed definition of S_ISDIR() in psql/copy.c
Previous:From: Pavel StehuleDate: 2009-04-26 04:24:55
Subject: Re: WIP: to_char, support for EEEE format

Privacy Policy | About PostgreSQL
Copyright © 1996-2017 The PostgreSQL Global Development Group