Re: FPW compression leaks information

From: Heikki Linnakangas <hlinnaka(at)iki(dot)fi>
To: Fujii Masao <masao(dot)fujii(at)gmail(dot)com>, Stephen Frost <sfrost(at)snowman(dot)net>
Cc: Michael Paquier <michael(dot)paquier(at)gmail(dot)com>, Magnus Hagander <magnus(at)hagander(dot)net>, Robert Haas <robertmhaas(at)gmail(dot)com>, pgsql-hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: FPW compression leaks information
Date: 2015-07-07 17:40:53
Message-ID: 559C0F25.8070305@iki.fi
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On 07/07/2015 07:31 PM, Fujii Masao wrote:
> Or another crazy idea is to append "random length" dummy data into
> compressed FPW. Which would make it really hard for an attacker to
> guess the information from WAL location.

It makes the signal more noisy, but you can still mount the same attack
if you just average it over more iterations. You could perhaps fuzz it
enough to make the attack impractical, but it doesn't exactly give me a
warm fuzzy feeling.

- Heikki

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Claudio Freire 2015-07-07 17:41:22 Re: FPW compression leaks information
Previous Message Stephen Frost 2015-07-07 17:29:05 Re: FPW compression leaks information