Re: Database Encryption (now required by law in Italy) - Mailing list pgsql-admin

From Dave Ewart
Subject Re: Database Encryption (now required by law in Italy)
Date
Msg-id 20040305143150.GO13042@nemesis.ox.icnet.uk
Whole thread Raw
In response to Re: Database Encryption (now required by law in Italy)  (Grega Bremec <gregab@noviforum.si>)
Responses Re: Database Encryption (now required by law in Italy)
List pgsql-admin
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Friday, 05.03.2004 at 14:47 +0100, Grega Bremec wrote:

> > > [1] There are ways of avoiding having to enter the info manually,
> > > but they're very tricky to implement securely.
> >
> > Not sure I follow this - there's no point AT ALL in using LoopAES if
> > you can mount the encrypted partitions without needing manual
> > intervention at boot time.
>
> Why not, Dave? As far as I understand it, one of the major values of
> fs-level data encryption was protection from the abused data being
> collected via the means of stolen laptops or even failed hard disks
> that've been handed over to various data-rescue labs.

Yes, that's exactly my point.  Yet it sounds like you're disagreeing
with me?!

> If a machine is reasonably secure both locally and remotely (i.e.
> secure- -enough passwords, rotated on a regular basis and frequently
> enough, or even some sort of PKID mechanism such as smartcards etc.
> and proper access control for local security, tight and reasonably
> reliable encrypted authentication and authorization for remote use),
> implementing an extra layer of any level of security is plain
> senseless and simply too expensive, both in terms of CPU overhead and
> thus performance drop (in the event of application-level encryption,
> for example), and time dedicated to research and implementation, as
> far as I'm concerned. One is better off by improving techniques in
> active use, investigating for the real weaknesses of their information
> system or dedicating the time to finding a better general solution
> that would cover as many areas as possible in one step.

I agree with this too.  Yet I still get the feeling you're disagreeing
with my original point ... !

> Same goes for interactive booting. In the world where even power
> failures are accounted for and automated, what does a user have to do
> with booting a machine? Implementing strong authentication in boot
> loaders for any kind of configuration other than the default would be
> perfectly sufficient, if you ask me. Also, if I may remind you at this
> point, human failure has so far remained to be one of the top reasons
> for security compromises, social engineering not being an uncommon
> one, so eliminating an extra point of failure in the case of an
> operator being required to guide the machine through the boot process
> doesn't harm in my opinion.
>
> One of the most important guidelines in implementing and assuring
> security for one's data would be the fact that security pays off only
> as long as the total cost of its implementation is lower than or equal
> to the maximum reasonably expectable harm done in the case of a
> security breach.

I'm not sure I get your point, Grega - are you suggesting that using
LoopAES is a good idea and that a system with LoopAES should also boot
up automatically?

I don't understand that at all.  If it boots up automatically, then the
encryption is effectively transparent and pointless.  All data on the
disk is 'pre-decrypted', very conveniently for whoever has just stolen
the server/disk.

If you're using LoopAES, it should *require* manual intervention, i.e.
passphrase to be entered.  If you want the system to boot up
automatically, using LoopAES is redundant and so should not be used.

Dave.
- --
Dave Ewart
Dave.Ewart@cancer.org.uk
Computing Manager, Epidemiology Unit, Oxford
Cancer Research UK
PGP: CC70 1883 BD92 E665 B840 118B 6E94 2CFD 694D E370

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFASI9VbpQs/WlN43ARAoJdAKDSEGYJ4QpAiavHjQo9faNDK9ihIgCdG/CP
X0nuHIF989baKSfaq4oy7c8=
=Na0T
-----END PGP SIGNATURE-----

pgsql-admin by date:

Previous
From: Mitch Pirtle
Date:
Subject: Re: Database Encryption (now required by law in Italy)
Next
From: Matt Davies
Date:
Subject: Re: Database Encryption (now required by law in Italy)