Re: FPW compression leaks information

Поиск
Список
Период
Сортировка
От Fujii Masao
Тема Re: FPW compression leaks information
Дата
Msg-id CAHGQGwGuC9Cd+vQWz8GovswMw2=PR+RO9pdvq1oghDeCrsMSfA@mail.gmail.com
обсуждение исходный текст
Ответ на Re: FPW compression leaks information  (Heikki Linnakangas <hlinnaka@iki.fi>)
Список pgsql-hackers
On Wed, Jul 8, 2015 at 2:40 AM, Heikki Linnakangas <hlinnaka@iki.fi> wrote:
> On 07/07/2015 07:31 PM, Fujii Masao wrote:
>>
>> Or another crazy idea is to append "random length" dummy data into
>> compressed FPW. Which would make it really hard for an attacker to
>> guess the information from WAL location.
>
>
> It makes the signal more noisy, but you can still mount the same attack if
> you just average it over more iterations. You could perhaps fuzz it enough
> to make the attack impractical, but it doesn't exactly give me a warm fuzzy
> feeling.

If the attack is impractical, what makes you feel nervous?
Maybe we should be concerned about a brute-force and dictionary
attacks rather than the attack using wal_compression?
Because ISTM that they are more likely to be able to leak passwords
in practice.

Regards,

-- 
Fujii Masao



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tomas Vondra
Дата:
Сообщение: Re: multivariate statistics / patch v7
Следующее
От: Fujii Masao
Дата:
Сообщение: Re: FPW compression leaks information