Re: [HACKERS] WIP: Data at rest encryption
| От | Peter Eisentraut |
|---|---|
| Тема | Re: [HACKERS] WIP: Data at rest encryption |
| Дата | |
| Msg-id | 3550f152-9349-ee2b-edae-a8ec09d8d9fc@2ndquadrant.com обсуждение |
| Ответ на | Re: [HACKERS] WIP: Data at rest encryption (Stephen Frost <sfrost@snowman.net>) |
| Ответы |
Re: [HACKERS] WIP: Data at rest encryption
|
| Список | pgsql-hackers |
On 6/13/17 15:20, Stephen Frost wrote: > For example, you could simply do: > > cp -a /path/to/PG /mnt/usb > > and you're done. If you're using filesystem level encryption then you'd > have to re-encrypt the data, using something like: > > tar -cf - /path/to/PG | openssl -key private.key > /mnt/usb/encrypted_cluster.tar > > And then you would need openssl on the other system to decrypt it. Or make the USB file system encrypted as well? If you're in that kind of environment, that would surely be feasible, if not required. -- Peter Eisentraut http://www.2ndQuadrant.com/ PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services
В списке pgsql-hackers по дате отправления: