KaiGai Kohei wrote:
> Tom Lane wrote:
> > Josh Berkus <[EMAIL PROTECTED]> writes:
> >> Multilevel frameworks have concepts of data hiding and data substitution 
> >> based on labels.  That is, if a user doesn't have permissions on data, 
> >> he's not merely supposed to be denied access to it, he's not even supposed 
> >> to know that the data exists.  In extreme cases (think military / CIA use) 
> >> data at a lower security level should be substitited for the higher 
> >> security level data which the user isn't allowed.  Silently.
> > 
> > Yeah, that's what I keep hearing that the spooks think they want.
> > I can't imagine how it would play nice with SQL-standard integrity
> > constraints.  Data that apparently violates a foreign-key constraint,
> > for example, would give someone a pretty good clue that there's
> > something there he's not being allowed to see.
> 
> Please note that SE-PostgreSQL does not adopt following technology
> because of its complexity. When user tries to update a PK refered by
> invisible FK, it generate an error. Thus, it is theoretically possible
> to estimate the invisible PKs by attacks with repeating.

I assume if you use only non-natural keys (use sequence numbers, not
codes like PHL or USA), there is no problem in finding the missing keys
by repeated testing.

-- 
  Bruce Momjian  <[EMAIL PROTECTED]>        http://momjian.us
  EnterpriseDB                             http://enterprisedb.com

  + If your life is a hard drive, Christ can be your backup. +

-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to