Search Postgresql Archives

Re: postgresql.key secure storage

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



OK guys, I would never have thought about modifying libpq to steal confidential 
data, and I have never used debuggers in this respect at all. 

So super gurus can yet do the bad thing.

Nevertheless 99% of users are not super gurus who could do such nasty things 
but a few of them could use an unencrypted private key. These few at least 
would have been frustrated if libpq could manage an encrypted private key. The 
server can manage such a key and the admin starting the server is prompted for 
the password. Ironically, it is generally accepted that it's better that the 
server private key be unencrypted so that any admin can start the server 
anytime.

Thank you.


-- 
Sent via pgsql-general mailing list (pgsql-general@xxxxxxxxxxxxxx)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-general

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Postgresql Jobs]     [Postgresql Admin]     [Postgresql Performance]     [Linux Clusters]     [PHP Home]     [PHP on Windows]     [Kernel Newbies]     [PHP Classes]     [PHP Books]     [PHP Databases]     [Postgresql & PHP]     [Yosemite]
  Powered by Linux