| From: | Nico Williams <nico(at)cryptonector(dot)com> |
|---|---|
| To: | ManiR <mani(dot)retnaswamy(at)gmail(dot)com> |
| Cc: | pgsql-general(at)postgresql(dot)org |
| Subject: | Re: Request for cryptographic mechanisms used in PostgreSQL |
| Date: | 2026-01-20 20:04:05 |
| Message-ID: | aW/ftSIGMMXsCzPU@ubby |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-general |
On Tue, Jan 20, 2026 at 02:47:36PM +0530, ManiR wrote:
> We would like your guidance on the *cryptographic mechanisms used by
> PostgreSQL*, including:
FYI this is the sort of thing where LLMs shine. I would start by asking
an LLM to write this and then I'd have expert humans review it.
Keep in mind that some of the cryptographic mechanism/algorithm usage is
transitive via PostgreSQL's dependencies (e.g., SASL, GSS-API, TLS), but
you might not be interested in expanding that (since you might want to
do separate CBOMs for those.
Keep in mind that some uses are not actually uses, like the PG crypto
extension, which makes cryptography available to PG _applications_.
You should also look at options to _not_ use cryptographic mechanisms.
I.e., options to use cleartext protocols. Obviously it's much worse to
have a cleartext protocol than one that uses, say, 1DES, even though
1DES is so weak as to be useles. Often auditors have a blind spot here.
And it's important not to treat the presence of, say, MD5 as fatal when
it's not being used for security-critical purposes.
IMO,
Nico
--
| From | Date | Subject | |
|---|---|---|---|
| Next Message | ManiR | 2026-01-21 06:27:36 | Re: Request for cryptographic mechanisms used in PostgreSQL |
| Previous Message | dmurvihill | 2026-01-20 19:03:25 | Re: Request for cryptographic mechanisms used in PostgreSQL |