Re: Spoofing as the postmaster

Поиск
Список
Период
Сортировка
От Peter Eisentraut
Тема Re: Spoofing as the postmaster
Дата
Msg-id 200712272133.02327.peter_e@gmx.net
обсуждение исходный текст
Ответ на Re: Spoofing as the postmaster  (Magnus Hagander <magnus@hagander.net>)
Список pgsql-hackers
Magnus Hagander wrote:
> > How expensive would it be to implement a "server_user" db open parameter
> > that would perform reverse credential passing to validate? "dbname=XXX
> > port=5432 server_user=postgres". If the server can't prove it is
> > postgres through UNIX socket credential passing, it fails. Similarly,
>
> Probably not very, but you should be able to achieve the same thing by
> moving the socket to a protected directory, I think?

What you are ulimately interested in is who runs a given server.  Making the 
inference that if the socket is in a directory that is currently only 
writable by a certain user implies that the user owns the server that offers 
that socket doesn't sound like a given to me.  And let's forget that it's not 
really straightforward to find out who has write access to some directory.

-- 
Peter Eisentraut
http://developer.postgresql.org/~petere/


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Archiver behavior at shutdown
Следующее
От: Tom Lane
Дата:
Сообщение: Re: Spoofing as the postmaster