Re: vulnerability/SSL

From: "Magnus Hagander" <mha(at)sollentuna(dot)net>
To: "dong changyu" <dcy1_1999(at)yahoo(dot)com>, <pgsql-general(at)postgresql(dot)org>
Subject: Re: vulnerability/SSL
Date: 2005-06-08 14:08:31
Message-ID: 6BCB9D8A16AC4241919521715F4D8BCE6C7616@algol.sollentuna.se
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

> Hi,
> I¡¯m using postgreSQL with SSL these days. The version I¡¯m
> using is 8.0.3. I found that it¡¯s impossible to use an
> encrypted key file.
> When you use a protected server.key file, you will be
> prompted to input your passphrase EVERYTIME IT¡¯S USED, not
> only when you start the server but also when a client makes a
> connection. So you have to leave the key file un-protected. I
> think it¡¯s a serious vulnerability since the security relies
> on the secrecy of the private key. Without encryption, the
> only thing we can use to protect the private key is the
> access control mechanism provided by the OS.
> Any comments on this issue?

If you don't trust the access control provided by the OS, why are you putting sensitive data on it?
If one can break your access control in the OS they can read all your data anyway - they don't even need to sniff the wire and decrypt it using the key. Or they can just change the passwords of your users and connect - or *change* they key.

If you're still concerned, it should be possible to mount is using a crypto loopback device which wuold require a password to get it in there (note! haven't tried it, but it should work). That would save you against someone rebooting your server on a separate OS and try to read it, but not against someone cracking the system while it's running. But again, your data would be just as vulnerable, so I don't really see the gain.

//Magnus

Responses

Browse pgsql-general by date

  From Date Subject
Next Message Michael Fuhr 2005-06-08 14:16:32 Re: return two elements
Previous Message Howard Cole 2005-06-08 14:01:01 Re: Backup Compatibility between minor versions.