Re: [HACKERS] Column Redaction

2014-10-31 Thread Simon Riggs
On 16 October 2014 01:29, Claudio Freire wrote: > But in any case, if the deterrence isn't enough, and you get attacked, > anything involving redaction as fleshed out in the OP is good for > nothing. The damage has been done already. The feature doesn't > meaningfully slow down extraction of data

Re: [HACKERS] Column Redaction

2014-10-15 Thread Claudio Freire
On Wed, Oct 15, 2014 at 8:59 PM, Simon Riggs wrote: > On 15 October 2014 21:03, Claudio Freire wrote: > >>> So you're familiar then with this process? So you know that an auditor >>> would trigger an investigation, resulting in deeper surveillance and >>> gathering of evidence that ends with vari

Re: [HACKERS] Column Redaction

2014-10-15 Thread Simon Riggs
On 15 October 2014 21:03, Claudio Freire wrote: >> So you're familiar then with this process? So you know that an auditor >> would trigger an investigation, resulting in deeper surveillance and >> gathering of evidence that ends with various remedial actions, such as >> court. How would that proc

Re: [HACKERS] Column Redaction

2014-10-15 Thread Claudio Freire
On Wed, Oct 15, 2014 at 4:59 PM, Simon Riggs wrote: > On 15 October 2014 20:41, Claudio Freire wrote: >> On Sat, Oct 11, 2014 at 4:40 AM, Simon Riggs wrote: >>> On 10 October 2014 16:45, Rod Taylor wrote: >>> Redaction prevents accidental information loss only, forcing any loss >>> that occurs

Re: [HACKERS] Column Redaction

2014-10-15 Thread Simon Riggs
On 15 October 2014 20:41, Claudio Freire wrote: > On Sat, Oct 11, 2014 at 4:40 AM, Simon Riggs wrote: >> On 10 October 2014 16:45, Rod Taylor wrote: >> Redaction prevents accidental information loss only, forcing any loss >> that occurs to be explicit. It ensures that loss of information can be

Re: [HACKERS] Column Redaction

2014-10-15 Thread Claudio Freire
On Sat, Oct 11, 2014 at 4:40 AM, Simon Riggs wrote: > On 10 October 2014 16:45, Rod Taylor wrote: > Redaction prevents accidental information loss only, forcing any loss > that occurs to be explicit. It ensures that loss of information can be > tied clearly back to an individual, like an ink pack

Re: [HACKERS] Column Redaction

2014-10-15 Thread Simon Riggs
On 15 October 2014 19:46, Robert Haas wrote: >> In IT terms, we're looking at controlling and reducing improper access >> to data by an otherwise Trusted person. The only problem is that some >> actions on data items are allowed, others are not. > > Sure, I don't disagree with any of that as a ge

Re: [HACKERS] Column Redaction

2014-10-15 Thread Robert Haas
On Wed, Oct 15, 2014 at 4:04 AM, Simon Riggs wrote: > On 14 October 2014 17:43, Robert Haas wrote: >> On Sat, Oct 11, 2014 at 3:40 AM, Simon Riggs wrote: >>> As soon as you issue the above query, you have clearly indicated your >>> intention to steal. Receiving information is no longer accidenta

Re: [HACKERS] Column Redaction

2014-10-15 Thread Simon Riggs
On 14 October 2014 17:43, Robert Haas wrote: > On Sat, Oct 11, 2014 at 3:40 AM, Simon Riggs wrote: >> As soon as you issue the above query, you have clearly indicated your >> intention to steal. Receiving information is no longer accidental, it >> is an explicit act that is logged in the auditing

Re: [HACKERS] Column Redaction

2014-10-14 Thread Robert Haas
On Sat, Oct 11, 2014 at 3:40 AM, Simon Riggs wrote: > As soon as you issue the above query, you have clearly indicated your > intention to steal. Receiving information is no longer accidental, it > is an explicit act that is logged in the auditing system against your > name. This is sufficient to

Re: [HACKERS] Column Redaction

2014-10-12 Thread Gavin Flower
On 10/10/14 21:57, Simon Riggs wrote: Postgres currently supports column level SELECT privileges. 1. If we want to confirm a credit card number, we can issue SELECT 1 FROM customer WHERE stored_card_number = '1234 5678 5344 7733' 2. If we want to look for card fraud, we need to be able to use t

Re: [HACKERS] Column Redaction

2014-10-11 Thread Bruce Momjian
On Sat, Oct 11, 2014 at 09:51:28AM +0100, Simon Riggs wrote: > > So it's not actually suitable for the example you gave. I don't think we > > want this feature... > > The full quote I read is the following... > > "Even though Oracle Data Redaction is not intended to protect against > attacks by d

Re: [HACKERS] Column Redaction

2014-10-11 Thread Joe Conway
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 10/11/2014 02:40 AM, Simon Riggs wrote: > As soon as you issue the above query, you have clearly indicated > your intention to steal. Receiving information is no longer > accidental, it is an explicit act that is logged in the auditing > system a

Re: [HACKERS] Column Redaction

2014-10-11 Thread Simon Riggs
On 10 October 2014 11:27, Heikki Linnakangas wrote: > I googled for Oracle Data redaction, and found "General Usage guidelines": > >> General Usage Guidelines >> >> * Oracle Data Redaction is not intended to protect against attacks by >> privileged database users who run ad hoc queries directly a

Re: [HACKERS] Column Redaction

2014-10-11 Thread Simon Riggs
On 10 October 2014 16:45, Rod Taylor wrote: > On my laptop I can pull all 10,000 card numbers in less than 1 second. Right. Like I said: covert channels exist. Great example of how to exploit them, thanks. Cool SQL. What could be the use of "a security feature that does not prevent security"?

Re: [HACKERS] Column Redaction

2014-10-10 Thread Simon Riggs
On 10 October 2014 19:26, Bruce Momjian wrote: > On Fri, Oct 10, 2014 at 02:05:05PM +0100, Thom Brown wrote: >> On 10 October 2014 13:43, Simon Riggs wrote: >> > On 10 October 2014 11:45, Thom Brown wrote: >> > >> >> To be honest, this all sounds rather flaky. > My other concern is you must hav

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
Rod, * Rod Taylor (rod.tay...@gmail.com) wrote: > For fun I gave the search a try. Neat! > On my laptop I can pull all 10,000 card numbers in less than 1 second. For > a text based item I don't imagine it would be much different. Numbers are > pretty easy to work with though. I had been plannin

Re: [HACKERS] Column Redaction

2014-10-10 Thread Bruce Momjian
On Fri, Oct 10, 2014 at 02:05:05PM +0100, Thom Brown wrote: > On 10 October 2014 13:43, Simon Riggs wrote: > > On 10 October 2014 11:45, Thom Brown wrote: > > > >> To be honest, this all sounds rather flaky. > > > > To be honest, suggesting anything at all is rather difficult and I > > recommend

Re: [HACKERS] Column Redaction

2014-10-10 Thread Kevin Grittner
Thom Brown wrote: > On 10 October 2014 15:56, Stephen Frost wrote: >> Thom Brown (t...@linux.com) wrote: >>> Data such as plain credit card numbers stored in a >>> column, even with all its data masked, would be easy to determine. >> >> I'm not as convinced of that as you are.. Though I'll point

Re: [HACKERS] Column Redaction

2014-10-10 Thread Rod Taylor
On Fri, Oct 10, 2014 at 10:56 AM, Stephen Frost wrote: > * Thom Brown (t...@linux.com) wrote: > > On 10 October 2014 12:45, Stephen Frost wrote: > > >> There's a difference between intending that there shouldn't be a way > > >> past security and just making access a matter of walking a longer >

Re: [HACKERS] Column Redaction

2014-10-10 Thread Claudio Freire
On Fri, Oct 10, 2014 at 11:58 AM, Stephen Frost wrote: >> You are obviously wearing your rose-colored glasses this morning. I >> predict a competent SQL programmer could write an SQL function, or >> client-side code, to pump the data out of the database using binary >> search in milliseconds per

Re: [HACKERS] Column Redaction

2014-10-10 Thread Thom Brown
On 10 October 2014 15:56, Stephen Frost wrote: > * Thom Brown (t...@linux.com) wrote: >> Data such as plain credit card numbers stored in a >> column, even with all its data masked, would be easy to determine. > > I'm not as convinced of that as you are.. Though I'll point out that in > the use-c

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
Robert, * Robert Haas (robertmh...@gmail.com) wrote: > On Fri, Oct 10, 2014 at 7:00 AM, Stephen Frost wrote: > > The discussion about looking up specific card numbers in the original > > email from Simon was actually an allowed use-case, as I understood it, > > not a risk concern. Indeed, if you

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
* Thom Brown (t...@linux.com) wrote: > On 10 October 2014 12:45, Stephen Frost wrote: > >> There's a difference between intending that there shouldn't be a way > >> past security and just making access a matter of walking a longer > >> route. > > > > Throwing random 16-digit numbers and associated

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
* Heikki Linnakangas (hlinnakan...@vmware.com) wrote: > You said above that it's OK to pass the card numbers to leakproof > functions. But if you allow that, you can write a function that > takes as argument a redacted card number, and unredacts it (using > the < and = operators in a binary search)

Re: [HACKERS] Column Redaction

2014-10-10 Thread Claudio Freire
On Fri, Oct 10, 2014 at 5:57 AM, Simon Riggs wrote: > > 1. If we want to confirm a credit card number, we can issue SELECT 1 > FROM customer WHERE stored_card_number = '1234 5678 5344 7733' > ... > 3. We want to block the direct retrieval of card numbers for > additional security. > In some cases,

Re: [HACKERS] Column Redaction

2014-10-10 Thread Thom Brown
On 10 October 2014 13:43, Simon Riggs wrote: > On 10 October 2014 11:45, Thom Brown wrote: > >> To be honest, this all sounds rather flaky. > > To be honest, suggesting anything at all is rather difficult and I > recommend people try it. I have, and most ideas I've had have been justifiably shot

Re: [HACKERS] Column Redaction

2014-10-10 Thread Robert Haas
On Fri, Oct 10, 2014 at 7:00 AM, Stephen Frost wrote: > * Thom Brown (t...@linux.com) wrote: >> To be honest, this all sounds rather flaky. Even if you do rate-limit >> their queries, they can use methods that avoid rate-limiting, such as >> recursive queries. And if you're only after one credit

Re: [HACKERS] Column Redaction

2014-10-10 Thread Simon Riggs
On 10 October 2014 12:01, Heikki Linnakangas wrote: > Really, I don't see how this can possible be made to work. You can't allow > ad hoc processing of data, and still avoid revealing it to the user. Anyone with unmonitored access and sufficient time can break through security. I think that is

Re: [HACKERS] Column Redaction

2014-10-10 Thread Simon Riggs
On 10 October 2014 11:45, Thom Brown wrote: > To be honest, this all sounds rather flaky. To be honest, suggesting anything at all is rather difficult and I recommend people try it. Everything sounds crap when you didn't think of it and you've given it an hour's thought. I'm not blind to the d

Re: [HACKERS] Column Redaction

2014-10-10 Thread Thom Brown
On 10 October 2014 12:45, Stephen Frost wrote: >> >> This gives the vague impression of security, but it really seems just >> >> the placing of a few obstacles in the way. >> > >> > One might consider that all security is just placing obstacles in the >> > way. >> >> There's a difference between i

Re: [HACKERS] Column Redaction

2014-10-10 Thread Heikki Linnakangas
On 10/10/2014 02:27 PM, Stephen Frost wrote: * Heikki Linnakangas (hlinnakan...@vmware.com) wrote: On 10/10/2014 02:05 PM, Stephen Frost wrote: * Heikki Linnakangas (hlinnakan...@vmware.com) wrote: On 10/10/2014 01:35 PM, Stephen Frost wrote: Regarding functions, 'leakproof' functions should

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
* Thom Brown (t...@linux.com) wrote: > On 10 October 2014 12:00, Stephen Frost wrote: > > The discussion about looking up specific card numbers in the original > > email from Simon was actually an allowed use-case, as I understood it, > > not a risk concern. Indeed, if you know a valid credit car

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
* Heikki Linnakangas (hlinnakan...@vmware.com) wrote: > On 10/10/2014 02:05 PM, Stephen Frost wrote: > >* Heikki Linnakangas (hlinnakan...@vmware.com) wrote: > >>On 10/10/2014 01:35 PM, Stephen Frost wrote: > >>>Regarding functions, 'leakproof' functions should be alright to allow, > >>>though Heik

Re: [HACKERS] Column Redaction

2014-10-10 Thread Thom Brown
On 10 October 2014 12:00, Stephen Frost wrote: > * Thom Brown (t...@linux.com) wrote: >> To be honest, this all sounds rather flaky. Even if you do rate-limit >> their queries, they can use methods that avoid rate-limiting, such as >> recursive queries. And if you're only after one credit card n

Re: [HACKERS] Column Redaction

2014-10-10 Thread Heikki Linnakangas
On 10/10/2014 02:05 PM, Stephen Frost wrote: * Heikki Linnakangas (hlinnakan...@vmware.com) wrote: On 10/10/2014 01:35 PM, Stephen Frost wrote: Regarding functions, 'leakproof' functions should be alright to allow, though Heikki brings up a good point regarding binary search being possible in a

Re: [HACKERS] Column Redaction

2014-10-10 Thread Hannu Krosing
On 10/10/2014 11:38 AM, Simon Riggs wrote: > On 10 October 2014 10:29, Heikki Linnakangas wrote: >> On 10/10/2014 11:57 AM, Simon Riggs wrote: >>> Postgres currently supports column level SELECT privileges. >>> >>> 1. If we want to confirm a credit card number, we can issue SELECT 1 >>> FROM custo

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
* Heikki Linnakangas (hlinnakan...@vmware.com) wrote: > On 10/10/2014 01:35 PM, Stephen Frost wrote: > >Regarding functions, 'leakproof' functions should be alright to allow, > >though Heikki brings up a good point regarding binary search being > >possible in a plpgsql function (or even directly by

Re: [HACKERS] Column Redaction

2014-10-10 Thread Heikki Linnakangas
On 10/10/2014 01:35 PM, Stephen Frost wrote: Regarding functions, 'leakproof' functions should be alright to allow, though Heikki brings up a good point regarding binary search being possible in a plpgsql function (or even directly by a client). Of course, that approach also requires that you ha

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
* Thom Brown (t...@linux.com) wrote: > To be honest, this all sounds rather flaky. Even if you do rate-limit > their queries, they can use methods that avoid rate-limiting, such as > recursive queries. And if you're only after one credit card number > (to use the original example), you'd get it i

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
* Heikki Linnakangas (hlinnakan...@vmware.com) wrote: > On 10/10/2014 01:21 PM, Simon Riggs wrote: > >Redaction is now a feature available in other databases. I guess its > >possible its all smoke and mirrors, but thats why we discuss stuff > >before we build it. > > I googled for Oracle Data reda

Re: [HACKERS] Column Redaction

2014-10-10 Thread Thom Brown
On 10 October 2014 11:35, Stephen Frost wrote: > Simon, > > * Simon Riggs (si...@2ndquadrant.com) wrote: >> The requirement for redaction cannot be provided by a view. >> >> A view provides a single value for each column, no matter whether it >> is used in SELECT or WHERE clause. >> >> Redaction r

Re: [HACKERS] Column Redaction

2014-10-10 Thread Pavel Stehule
Hi 2014-10-10 10:57 GMT+02:00 Simon Riggs : > Postgres currently supports column level SELECT privileges. > > 1. If we want to confirm a credit card number, we can issue SELECT 1 > FROM customer WHERE stored_card_number = '1234 5678 5344 7733' > > 2. If we want to look for card fraud, we need to

Re: [HACKERS] Column Redaction

2014-10-10 Thread Stephen Frost
Simon, * Simon Riggs (si...@2ndquadrant.com) wrote: > The requirement for redaction cannot be provided by a view. > > A view provides a single value for each column, no matter whether it > is used in SELECT or WHERE clause. > > Redaction requires output formatting only, but unchanged for other p

Re: [HACKERS] Column Redaction

2014-10-10 Thread Heikki Linnakangas
On 10/10/2014 01:21 PM, Simon Riggs wrote: Redaction is now a feature available in other databases. I guess its possible its all smoke and mirrors, but thats why we discuss stuff before we build it. I googled for Oracle Data redaction, and found "General Usage guidelines": General Usage Guide

Re: [HACKERS] Column Redaction

2014-10-10 Thread Simon Riggs
On 10 October 2014 11:08, Damian Wolgast wrote: > >> The problem there is that the SQL for (2) changes frequently, so we >> want to give people SQL access. > > So you want to give people access to your SQL database and worry that they > could see specific information (credit card numbers) in plai

Re: [HACKERS] Column Redaction

2014-10-10 Thread Damian Wolgast
> The problem there is that the SQL for (2) changes frequently, so we > want to give people SQL access. So you want to give people access to your SQL database and worry that they could see specific information (credit card numbers) in plain and therefore you want to format it, so that people ca

Re: [HACKERS] Column Redaction

2014-10-10 Thread Simon Riggs
On 10 October 2014 10:15, Thom Brown wrote: > On 10 October 2014 09:57, Simon Riggs wrote: >> Postgres currently supports column level SELECT privileges. >> >> 1. If we want to confirm a credit card number, we can issue SELECT 1 >> FROM customer WHERE stored_card_number = '1234 5678 5344 7733' >>

Re: [HACKERS] Column Redaction

2014-10-10 Thread Simon Riggs
On 10 October 2014 10:29, Heikki Linnakangas wrote: > On 10/10/2014 11:57 AM, Simon Riggs wrote: >> >> Postgres currently supports column level SELECT privileges. >> >> 1. If we want to confirm a credit card number, we can issue SELECT 1 >> FROM customer WHERE stored_card_number = '1234 5678 5344

Re: [HACKERS] Column Redaction

2014-10-10 Thread Damian Wolgast
> >This would have other uses as well, such as default report formats, so >we can store financial amounts as NUMERIC, but format them on >retrieval as $12,345.78 etc.. Nice idea, but what if you need to do further calculations? If you output the value of credit card transactions it works fine, b

Re: [HACKERS] Column Redaction

2014-10-10 Thread Heikki Linnakangas
On 10/10/2014 11:57 AM, Simon Riggs wrote: Postgres currently supports column level SELECT privileges. 1. If we want to confirm a credit card number, we can issue SELECT 1 FROM customer WHERE stored_card_number = '1234 5678 5344 7733' 2. If we want to look for card fraud, we need to be able to

Re: [HACKERS] Column Redaction

2014-10-10 Thread Thom Brown
On 10 October 2014 09:57, Simon Riggs wrote: > Postgres currently supports column level SELECT privileges. > > 1. If we want to confirm a credit card number, we can issue SELECT 1 > FROM customer WHERE stored_card_number = '1234 5678 5344 7733' > > 2. If we want to look for card fraud, we need to

Re: [HACKERS] Column Redaction

2014-10-10 Thread Dave Page
On Fri, Oct 10, 2014 at 9:57 AM, Simon Riggs wrote: > Postgres currently supports column level SELECT privileges. > > 1. If we want to confirm a credit card number, we can issue SELECT 1 > FROM customer WHERE stored_card_number = '1234 5678 5344 7733' > > 2. If we want to look for card fraud, we n

[HACKERS] Column Redaction

2014-10-10 Thread Simon Riggs
Postgres currently supports column level SELECT privileges. 1. If we want to confirm a credit card number, we can issue SELECT 1 FROM customer WHERE stored_card_number = '1234 5678 5344 7733' 2. If we want to look for card fraud, we need to be able to use the full card number to join to transacti