Re: Postgres syscalls

Поиск
Список
Период
Сортировка
От Stephan Szabo
Тема Re: Postgres syscalls
Дата
Msg-id 20021212160430.L13718-100000@megazone23.bigpanda.com
обсуждение исходный текст
Ответ на Postgres syscalls  ("Diego T." <sebulba76it@yahoo.it>)
Ответы Re: Postgres syscalls  ("Shridhar Daithankar" <shridhar_daithankar@persistent.co.in>)
Список pgsql-hackers
On Fri, 13 Dec 2002, [iso-8859-1] Diego T. wrote:

> Hello I'm an Italian student of computer science at
> University of Rome "La Sapienza". I've to analyze some
> daemons which run under root privileges with a tool
> developed by my departement. This tool intercepts
> critical syscalls, like Execve, and blocks illegal
> invocation of that primitives (E.g. Execve("/bin/sh"))
> performed by a daemon which runs under root
> privileges. This approach blocks buffer overflow
> attacks before they can complete (or I hope so). Now,
> the problem is that postgres doesn' t run under root
> privileges and that the tool intercepts only the
> syscalls invoked by a process with root privileges. Is
> possible to force postgres to run under root
> privileges? How can be done? I know my request is
> anomalous but i've to do this for my laboratory
> project course. I should be very grateful if you'll
> answer as soon as possible.

You could probably just hack out the checks in main/main.c
and recompile, but postgres does call system and such to do
things (like create databases) so I'm not sure it'd be terribly
useful for you.




В списке pgsql-hackers по дате отправления:

Предыдущее
От: "Diego T."
Дата:
Сообщение: Postgres syscalls
Следующее
От: wade
Дата:
Сообщение: invalid tid errors.