Re: postgresql.key secure storage - Mailing list pgsql-general

From Tom Lane
Subject Re: postgresql.key secure storage
Date
Msg-id 15858.1252937625@sss.pgh.pa.us
Whole thread Raw
In response to Re: postgresql.key secure storage  ("Saleem Edah-Tally" <nmset@netcourrier.com>)
Responses Re: postgresql.key secure storage  ("Saleem EDAH-TALLY" <nmset@netcourrier.com>)
List pgsql-general
"Saleem Edah-Tally" <nmset@netcourrier.com> writes:
> I would have been more at ease if libpq could manage a PKCS12 cert. or some
> secure wallet/keystore that contains both the public and private keys for SSL
> traffic. Neither the end user nor any admin would have to provide the password
> to access the keys inside the secured storage as I would have prefered to
> hard-code the password. Hard coding is not an elegant solution I agree, but
> leaving on the table an unencrypted private key is not something to do IMO.

You realize, of course, that there is absolutely no way you can stop the
user from extracting whatever data you put on his machine.  "Secure
wallet" is an exercise in self-delusion.  If you want actual security,
there had better be a machine that *you* control in the way.

            regards, tom lane

pgsql-general by date:

Previous
From: "A. Kretschmer"
Date:
Subject: Re: Cartesian product not correct
Next
From: Tom Lane
Date:
Subject: Re: Checkpoint request failed, permission denied