Re: Disk Encryption - Postgresql vs. Oracle - Mailing list pgsql-admin

From Bruce Momjian
Subject Re: Disk Encryption - Postgresql vs. Oracle
Date
Msg-id 200504020340.j323ekL13834@candle.pha.pa.us
Whole thread Raw
In response to Re: Disk Encryption - Postgresql vs. Oracle  (Christopher Browne <cbbrowne@acm.org>)
List pgsql-admin
Wow, nice analysis.  Should this be in our documentation somewhere?

---------------------------------------------------------------------------

Christopher Browne wrote:
> In the last exciting episode, doom@kzsu.stanford.edu (Joseph Brenner) wrote:
> > I was talking to someone just recently who was saying that they
> > were thinking about going with Oracle rather than Postgresql
> > because Oracle has a their story in place about how to do
> > disk encryption.  So I am of course, looking into how to do it
> > with Postgresql...
> >
> > (As to why you would *care* about disk encryption, I would guess
> > the scenario is you've got a bunch of guys in the back room
> > hot-swapping RAID drives, and you'd rather not post armed guards
> > there to watch what happens to the older units.)
> >
> > contrib/pgcrypto looks pretty interesting, but I gather it's
> > intended to let you encrypt particular fields inside a database,
> > rather than the whole ball of wax.
> >
> > Maybe the right way to do it is to just get the OS to encrypt
> > everything, and not make postgresql jump through any extra hoops?
> > I see there's a general Linux disk encryption FAQ out there:
> >
> >   http://www.telenovela-world.com/~spade/linux/howto/Disk-Encryption-HOWTO/index.html
> >
> > Doing some searches of the archives, I haven't turned up much
> > discussion more recent than about a year ago, e.g.
> >
> >   http://archives.postgresql.org/pgsql-admin/2004-03/msg00049.php
> >
> > Is there anything new on this front?
>
> If your threat model indicates that encrypting data at the disk level
> represents protection against some attack involving theft of disk
> drives, you would presumably find that using some form of OS loopback
> device with a crypto layer to be useful, and that would not require
> any particular support from PostgreSQL.  Note that this model cannot
> protect against threats from system administrators as, in order for
> them to mount the filesystems, they must have access to the crypto
> keys.  Furthermore, it cannot protect _at all_ against attacks that
> can take place while the database is up and running.
>
> A second approach, using pgcrypto, requires that you entrust the
> database process, and hence anyone with access to the relevant Unix
> user, with the cryptographic keys.  That can allow some portions of
> the data to be encrypted, and others to remain plain text, and may
> again be suitable if you trust the system administrators with the
> keys.  It has the merit that the sensitive data stays encrypted on
> disk at all times; it is only in plain text form in memory and
> possibly as it is being transmitted between server and client (protect
> against that using SSL connections).
>
> A third approach is for the cryptographic layer to stay purely on the
> application/client side.  Encrypted data is encrypted on the client
> side, and is only ever decrypted there.  If you have any reason to be
> concerned about threats that target the server, then you must not
> trust either of the first two approaches, but must look to client-side
> processing.  Google for _Translucent Databases_ for more on this
> approach...
> --
> output = ("cbbrowne" "@" "gmail.com")
> http://linuxdatabases.info/info/slony.html
> They are  called  computers  simply  because computation  is  the only
> significant job that has so far been given to them.  -- Louis Ridenour
>
> ---------------------------(end of broadcast)---------------------------
> TIP 3: if posting/reading through Usenet, please send an appropriate
>       subscribe-nomail command to majordomo@postgresql.org so that your
>       message can get through to the mailing list cleanly
>

--
  Bruce Momjian                        |  http://candle.pha.pa.us
  pgman@candle.pha.pa.us               |  (610) 359-1001
  +  If your life is a hard drive,     |  13 Roberts Road
  +  Christ can be your backup.        |  Newtown Square, Pennsylvania 19073

pgsql-admin by date:

Previous
From: Christopher Browne
Date:
Subject: Re: Disk Encryption - Postgresql vs. Oracle
Next
From: Christopher Browne
Date:
Subject: Re: Disk Encryption - Postgresql vs. Oracle