Re: postgresql.key secure storage - Mailing list pgsql-general

From Saleem EDAH-TALLY
Subject Re: postgresql.key secure storage
Date
Msg-id 200909141939.48178.nmset@netcourrier.com
Whole thread Raw
In response to postgresql.key secure storage  ("Saleem EDAH-TALLY" <nmset@netcourrier.com>)
Responses Re: postgresql.key secure storage
List pgsql-general
OK guys, I would never have thought about modifying libpq to steal confidential
data, and I have never used debuggers in this respect at all.

So super gurus can yet do the bad thing.

Nevertheless 99% of users are not super gurus who could do such nasty things
but a few of them could use an unencrypted private key. These few at least
would have been frustrated if libpq could manage an encrypted private key. The
server can manage such a key and the admin starting the server is prompted for
the password. Ironically, it is generally accepted that it's better that the
server private key be unencrypted so that any admin can start the server
anytime.

Thank you.


pgsql-general by date:

Previous
From: Chris Barnes
Date:
Subject: Re: Locks in postgres causing system load and crash.
Next
From: Scott Marlowe
Date:
Subject: Re: Locks in postgres causing system load and crash.