Re: pg_hba.conf alternative

From: Andrew Dunstan <andrew(at)dunslane(dot)net>
To: korry <korry(at)starband(dot)net>
Cc: Postgresql Dev <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: pg_hba.conf alternative
Date: 2006-02-09 14:38:00
Message-ID: 43EB53C8.9070504@dunslane.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

korry wrote:

>>If you want the data hidden from system administrators, you need to have
>>the client encrypt it before storing it. Of course, that will have
>>massive implications for your application.
>>
>>
>
>Have you considered storing your data on an encrypted filesystem? I have no
>idea what kind of performance hit you would suffer, but you wouldn't have to
>change your application at all that way. Perhaps a private mount so that
>only the postgresql process tree could see the decrypted bits?
>
>
>

Since what he is worried about is the ability of admins to get at the
data by connecting to the postgres server (after changing pg_hba.conf),
this will not make the slightest difference - the data would be
decrypted before it ever got to the intruder.

For encryption to be effective against some perceived threat, the data
has to be encrypted before it gets anywhere the spy can see it.

There really are no magic solutions.

Unfortunately, there is not a similar shortage of snake oil.

cheers

andrew

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Andrew Dunstan 2006-02-09 14:41:33 Re: User Defined Types in Java
Previous Message Tom Lane 2006-02-09 14:33:35 Re: User Defined Types in Java