From: | Justin Clift <justin(at)postgresql(dot)org> |
---|---|
To: | Allan Engelhardt <allane(at)cybaea(dot)com> |
Cc: | Michal Prinke <bogien(at)conecto(dot)pl>, pgsql-general(at)postgresql(dot)org |
Subject: | Re: Re: Encrypting database? |
Date: | 2001-07-11 04:40:14 |
Message-ID: | 3B4BD8AE.152BE7F9@postgresql.org |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general |
Hi,
One solution which can be used in linux is to have your PostgreSQL data
stored in an encrypted partition. That way if people rip off your hard
drive, without the passphrase they don't really have any good way of
getting your data.
:-)
Regards and best wishes,
Justin Clift
Allan Engelhardt wrote:
>
> Michael,
>
> On the break-in scenario:
>
> Doing this at the database level would not be productive. This should be done at the driver hardware level (preferred) or at the very least at the operating system level.
>
> See the "Loopback Encrypted Filesystem HOWTO" at http://encryptionhowto.sourceforge.net/ for one way you can achieve this in Linux.
>
> On the row level scenario:
>
> You would probably want to encrypt at the client level for this. The client knows the user, and hence can get the right password, and you don't really want paintext over TCP/IP: better to send the encrypted data to the client.
>
> There are plenty of encryption algorithms out there with libraries to help you. I like Blowfish (http://www.counterpane.com/blowfish.html) but whatever you choose: THERE IS MORE TO SECURITY THAN CHOOSING AN ENCRYPTION ALGORITHM. You have to look at the WHOLE system.
>
> Allan.
>
> Michal Prinke wrote:
>
> > Hello,
> >
> > Suppose I have some very important data stored in my PostgreSQL 7.1.2
> > database. One day, someone breaks into my office and takes my hard disk away.
> > The question is: are the data encrypted? Will the hacker be able to read
> > anything without the administrator password, just by - for instance - browsing
> > the filesystem or reading disk sectors?
> >
> > Going beyond the first problem... let's say I store some personal data in a
> > table named CLIENTS. Are there any database-level mechanisms that support
> > encrypting table rows independently? I mean in that way that even the DB
> > administrator won't see the original data; yes, he would be able to modify it,
> > even to erase it, but - as far as he does not have a specific user's password
> > - he won't be able to see his data. ...?
> >
> > Of course, I can encrypt rows from the outside (e.g. in some PHP script), but
> > I would love to have some database-level solution, preferably in PostgreSQL.
> > Is there any?
> >
> > --- Thanks for any help!
>
> ---------------------------(end of broadcast)---------------------------
> TIP 1: subscribe and unsubscribe commands go to majordomo(at)postgresql(dot)org
From | Date | Subject | |
---|---|---|---|
Next Message | Tom Lane | 2001-07-11 05:10:04 | Re: View prevents index |
Previous Message | Bruce Momjian | 2001-07-11 03:43:52 | Re: Embedded sql PREPARE statement |