Re: New types for transparent encryption

Поиск
Список
Период
Сортировка
От Itagaki Takahiro
Тема Re: New types for transparent encryption
Дата
Msg-id 20090713125536.93A7.52131E4D@oss.ntt.co.jp
обсуждение исходный текст
Ответ на Re: New types for transparent encryption  (Sam Mason <sam@samason.me.uk>)
Ответы Re: New types for transparent encryption  (tomas@tuxteam.de)
Re: New types for transparent encryption  (Sam Mason <sam@samason.me.uk>)
Список pgsql-hackers
Sam Mason <sam@samason.me.uk> wrote:

> As others have said, handling encryption client side would seem to offer
> many more benefits (transparently within libpq offering easy adoption).

Libpq is not the only driver. Do we need to develop transparent decryption
for each drivers? (libpq, JDBC, npgsql, py-postgresql, ...)

Also, if you disallow server-side decode, you cannot create indexes on
encrypted values because the same values are not always encrypted to the
same codes. (Indexes will sort keys based on order of decoded values.)

I think there is no difference between client-side decryption and
clinet-supplied password as far as clinet-server communication is
encrypted (i.e, SSL login).

> Should the password be this widely shared? it would seem to make more
> sense if it was a write-only variable and never exposed outside the
> crypto module.

We can use an user-defined GUC variables as a write-only variable.
When we supply some show_hook function to GUC variable,
SET still works but SHOW only shows '****' and hides real passwords.

Regards,
---
ITAGAKI Takahiro
NTT Open Source Software Center




В списке pgsql-hackers по дате отправления:

Предыдущее
От: KaiGai Kohei
Дата:
Сообщение: Re: [PATCH] SE-PgSQL/lite rev.2163
Следующее
От: tomas@tuxteam.de
Дата:
Сообщение: Re: New types for transparent encryption