Re: storing an explicit nonce

From: Bruce Momjian <bruce(at)momjian(dot)us>
To: Sasasu <i(at)sasa(dot)su>
Cc: pgsql-hackers(at)lists(dot)postgresql(dot)org
Subject: Re: storing an explicit nonce
Date: 2021-09-27 20:34:48
Message-ID: 20210927203448.GB12052@momjian.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Sun, Sep 5, 2021 at 10:51:42PM +0800, Sasasu wrote:
> Hi, community,
>
> It looks like we are still considering AES-CBC, AES-XTS, and AES-GCM(-SIV).
> I want to say something that we don't think about.
>
> For AES-CBC, the IV should be not predictable. I think LSN or HASH(LSN,
> block number or something) is predictable. There are many CVE related to
> AES-CBC with a predictable IV.

The LSN would change every time the page is modified, so while the LSN
could be predicted, it would not be reused. However, there is currently
no work being done on page-level encryption of Postgres.

--
Bruce Momjian <bruce(at)momjian(dot)us> https://momjian.us
EDB https://enterprisedb.com

If only the physical world exists, free will is an illusion.

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Euler Taveira 2021-09-27 20:49:08 Re: how to distinguish between using the server as a standby or for executing a targeted recovery in PG 11?
Previous Message Mark Dilger 2021-09-27 20:21:36 Re: Fixing WAL instability in various TAP tests