From: | Bruce Momjian <bruce(at)momjian(dot)us> |
---|---|
To: | Robert Haas <robertmhaas(at)gmail(dot)com> |
Cc: | Andres Freund <andres(at)anarazel(dot)de>, Stephen Frost <sfrost(at)snowman(dot)net>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: XTS cipher mode for cluster file encryption |
Date: | 2021-10-23 15:49:44 |
Message-ID: | 20211023154944.GA22621@momjian.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Mon, Oct 18, 2021 at 12:37:39PM -0400, Robert Haas wrote:
> I do really like the idea of using AES-GCM-SIV not because I know
> anything about it, but because the integrity checking seems cool, and
----------
> storing the nonce seems like it would improve security. However, based
Frankly, I think we need to be cautious about doing anything related to
security for "cool" motivations. (This might be how OpenSSL became such
a mess.) For non-security features, you can often add a few lines of
code to enable some cool use-case. For security features, you have to
block its targeted attack methods fully or it is useless. (It doesn't
need to block all attack methods.) To fully block attack methods,
security features must be thoroughly designed and all potential
interactions must be researched.
When adding non-security Postgres features, cool features can be more
easily implemented because they are built on the sold foundation of
Postgres. For security features, you have to assume that attacks can
come from anywhere, so the foundation is unclear and caution is wise.
--
Bruce Momjian <bruce(at)momjian(dot)us> https://momjian.us
EDB https://enterprisedb.com
If only the physical world exists, free will is an illusion.
From | Date | Subject | |
---|---|---|---|
Next Message | Bruce Momjian | 2021-10-23 16:03:36 | Re: XTS cipher mode for cluster file encryption |
Previous Message | Mikhail | 2021-10-23 15:40:44 | Re: [PATCH] Make ENOSPC not fatal in semaphore creation |