Re: XTS cipher mode for cluster file encryption

Поиск
Список
Период
Сортировка
От Sasasu
Тема Re: XTS cipher mode for cluster file encryption
Дата
Msg-id 01cc0870-5526-de25-7ab5-55247f7cfca6@sasa.su
обсуждение исходный текст
Ответ на Re: XTS cipher mode for cluster file encryption  (Stephen Frost <sfrost@snowman.net>)
Ответы Re: XTS cipher mode for cluster file encryption  (Stephen Frost <sfrost@snowman.net>)
Список pgsql-hackers
On 2021/10/16 04:57, Tomas Vondra wrote:
 >
 > Seems reasonable, on the assumption the threat models are the same.

On 2021/10/16 03:22, Stephen Frost wrote:
> plain64: the initial vector is the 64-bit little-endian version of the
> sector number, padded with zeros if necessary
> 
> That is, the default for LUKS is AES, XTS, with a simple IV.  That
> strikes me as a pretty ringing endorsement
On 2021/10/18 05:23, Tomas Vondra wrote:
 >
 > AFAICS the threat model the patch aims to address is an attacker who can
 > observe the data (e.g. a low-privileged OS user), but can't modify the
 > files. Which seems like a reasonable model for shared environments.

I agree this threat model.

And if PostgreSQL is using XTS, there is no different with dm-encrypt.
The user can use dm-encrypt directly.

Вложения

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Sasasu
Дата:
Сообщение: Re: XTS cipher mode for cluster file encryption
Следующее
От: "houzj.fnst@fujitsu.com"
Дата:
Сообщение: RE: Failed transaction statistics to measure the logical replication progress