Re: postgresql.key secure storage

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: "Saleem Edah-Tally" <nmset(at)netcourrier(dot)com>
Cc: pgsql-general(at)postgresql(dot)org
Subject: Re: postgresql.key secure storage
Date: 2009-09-14 14:13:45
Message-ID: 15858.1252937625@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

"Saleem Edah-Tally" <nmset(at)netcourrier(dot)com> writes:
> I would have been more at ease if libpq could manage a PKCS12 cert. or some
> secure wallet/keystore that contains both the public and private keys for SSL
> traffic. Neither the end user nor any admin would have to provide the password
> to access the keys inside the secured storage as I would have prefered to
> hard-code the password. Hard coding is not an elegant solution I agree, but
> leaving on the table an unencrypted private key is not something to do IMO.

You realize, of course, that there is absolutely no way you can stop the
user from extracting whatever data you put on his machine. "Secure
wallet" is an exercise in self-delusion. If you want actual security,
there had better be a machine that *you* control in the way.

regards, tom lane

In response to

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Tom Lane 2009-09-14 14:29:54 Re: Checkpoint request failed, permission denied
Previous Message A. Kretschmer 2009-09-14 14:13:37 Re: Cartesian product not correct