Skip to content

Proof-of-concept: Protect decrypted relation keys take 2 #467

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft
wants to merge 2 commits into
base: TDE_REL_17_STABLE
Choose a base branch
from

Conversation

AndersAstrand
Copy link
Collaborator

Here is an alternative version of the POC in #446

This version doesn't use ResourceOwners, but instead frees the decrypted keys on smgr close. Unfortunately we don't get to know when smgr destroy is done, which would probably be the most correctest place to do this.

This version also caches the encrypted keys separately, however I'm not sure whether that's valuable or not. Need to do some testing.

Using openssl's secure allocators for these ensures they are never
swapped to disk or present in a core dump.

This commit is mostly a poc for only keeping encrypted keys in the smgr
cache, as that memory is not protected.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant