From: | Bruce Momjian <bruce(at)momjian(dot)us> |
---|---|
To: | Tomas Vondra <tomas(dot)vondra(at)2ndquadrant(dot)com> |
Cc: | Stephen Frost <sfrost(at)snowman(dot)net>, Robert Haas <robertmhaas(at)gmail(dot)com>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Transparent Data Encryption (TDE) and encrypted files |
Date: | 2019-10-04 22:06:10 |
Message-ID: | 20191004220610.GG29227@momjian.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Fri, Oct 4, 2019 at 11:48:19PM +0200, Tomas Vondra wrote:
> On Fri, Oct 04, 2019 at 04:58:14PM -0400, Bruce Momjian wrote:
> > On Fri, Oct 4, 2019 at 10:46:57PM +0200, Tomas Vondra wrote:
> > > Oracle also has a handy "TDE best practices" document [2], which says
> > > when to use column-level encryption - let me quote a couple of points:
> > >
> > > * Location of sensitive information is known
> > >
> > > * Less than 5% of all application columns are encryption candidates
> > >
> > > * Encryption candidates are not foreign-key columns
> > >
> > > * Indexes over encryption candidates are normal B-tree indexes (this
> > > also means no support for indexes on expressions, and likely partial
> > > indexes)
> > >
> > > * No support from hardware crypto acceleration.
> >
> > Aren't all modern systems going to have hardware crypto acceleration,
> > i.e., AES-NI CPU extensions. Does that mean there is no value of
> > partial encryption on such systems? Looking at the overhead numbers I
> > have seen for AES-NI-enabled systems, I believe it.
> >
>
>
> That's a good question, I don't know the answer. You're right most
> systems have CPUs with AES-NI these days, and I'm not sure why the
> column encryption does not leverage that.
>
> Maybe it's because column encryption has to encrypt/decrypt much smaller
> chunks of data, and AES-NI is not efficient for that? I don't know.
For full-cluster TDE with AES-NI-enabled, the performance impact is
usually ~4%, so doing anything more granular doesn't seem useful. See
this PGCon presentation with charts:
https://www.youtube.com/watch?v=TXKoo2SNMzk#t=27m50s
Having anthing more fine-grained that all-cluster didn't seem worth it.
Using per-user keys is useful, but also much harder to implement.
--
Bruce Momjian <bruce(at)momjian(dot)us> http://momjian.us
EnterpriseDB http://enterprisedb.com
+ As you are, so once was I. As I am, so you will be. +
+ Ancient Roman grave inscription +
From | Date | Subject | |
---|---|---|---|
Next Message | Justin Pryzby | 2019-10-04 22:40:08 | Re: format of pg_upgrade loadable_libraries warning |
Previous Message | Bruce Momjian | 2019-10-04 21:49:07 | Re: Transparent Data Encryption (TDE) and encrypted files |