From: | Ron <ronljohnsonjr(at)gmail(dot)com> |
---|---|
To: | pgsql-admin(at)lists(dot)postgresql(dot)org |
Subject: | Re: How to encrypt password in pgpass file |
Date: | 2021-02-24 05:40:37 |
Message-ID: | c7a664cb-e233-3390-ce62-e832d753e66f@gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-admin |
On 2/23/21 10:42 PM, raf wrote:
[snip]
> Sometimes, the security requirements are for
> encryption-at-rest, and it doesn't particularly matter
> if encryption-at-rest is actually secure against likely
> threats (sadly).
>
> For example, you could use file system encryption (e.g.
> ecryptfs/LUKS/Linux, FileVault/macOS,
> BitLocker/Windows). Then all of your files are
> encrypted at rest, including .pgpass.
>
> But it's only secure when the computer is powered down
> (i.e. if it is physically stolen, or the disk is
> physically removed). It provides no security for a
> computer that is up and running, and compromised.
>
> But that might satisfy the parties that make up the
> requirements. It all depends on the threat model that
> they need to address.
I see the same thing when SQL Server systems are audited. One of the check
boxes is "encrypted database". I say, "encrypt columns, and modify the
application to decrypt the columns"; the customer laughs, and asks about
TDE, which I implement.
Of course, these systems are VMs and SQL Server is rarely turned off, so it
serves no practical purpose other than to encrypt the backups. Auditors
don't understand that, hear "it's encrypted" and are happy when I show them
AES-128 and that I rotate the key yearly.
--
Angular momentum makes the world go 'round.
From | Date | Subject | |
---|---|---|---|
Next Message | Tim Cross | 2021-02-24 06:04:35 | Re: How to encrypt password in pgpass file |
Previous Message | raf | 2021-02-24 04:42:23 | Re: How to encrypt password in pgpass file |