From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Andrew Sullivan <ajs(at)commandprompt(dot)com> |
Cc: | pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: [0/4] Proposal of SE-PostgreSQL patches |
Date: | 2008-05-06 21:44:44 |
Message-ID: | 25230.1210110284@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers pgsql-patches |
Andrew Sullivan <ajs(at)commandprompt(dot)com> writes:
> There is an issue in most high-security systems having to do with
> side-channel leakage of supposedly sensitive data. So, the mere
> exsistence of certain tables, columns, or users might be regarded as
> security-sensitive data. I'm not sure I see how to get around that
> without mucking in the areas that are causing some of the trouble.
Well, the setup that I suggested would still allow people to set
restrictions that would prevent *user* queries from seeing rows in the
system catalogs. I'm not sure that's a good idea either --- pg_dump,
meet foot gun --- but at least it can't corrupt the functioning of the
server itself.
> But I think before we get into that discussion, a fairly clear
> statement of exactly which problems are going to be in scope is
> needed.
Agreed, that would help.
> FWIW, I support and think important the row- and column- level access
> controls this seems to be proposing, at least in principle. Whether
> that's a support that will extend to 2x overhead on everything is
> rather a different matter. Also, I am more than prepared to trade
> away some cases in order to get a broadly useful functionality (so if
> you can't hide the existence of a table, but all efforts to learn its
> contents don't work, I might be willing to support that trade-off).
Yeah, that's something that we need to think about too. ISTM that this
patch's proposed restrictions on SQL object access are largely
duplicative of SQL-standard access permissions, and they'll become more
so if the pending patch to implement SQL column permissions gets in.
I think a good case could be made for throwing out all of that and using
the SELinux code only for row-level filtering.
(And of course the next question after that is why we should want to
depend on SELinux at all, rather than implementing row filtering
in the framework of SQL permissions...)
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Andrew Dunstan | 2008-05-06 21:56:53 | Re: statement timeout vs dump/restore |
Previous Message | Bruce Momjian | 2008-05-06 21:34:49 | Re: [GENERAL] psql \pset pager |
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2008-05-06 21:59:11 | Re: Snapshot management, final |
Previous Message | Bruce Momjian | 2008-05-06 21:34:49 | Re: [GENERAL] psql \pset pager |