Re: abstract Unix-domain sockets

Поиск
Список
Период
Сортировка
От Andreas Karlsson
Тема Re: abstract Unix-domain sockets
Дата
Msg-id 3d24b59c-3e35-1dd0-763b-5f65e1d89422@proxel.se
обсуждение исходный текст
Ответ на Re: abstract Unix-domain sockets  (Peter Eisentraut <peter.eisentraut@2ndquadrant.com>)
Список pgsql-hackers
On 11/9/20 9:04 AM, Peter Eisentraut wrote:
> On 2020-11-09 07:08, Michael Paquier wrote:
>> As abstract namespaces don't have permissions, anyone knowing the name
>> of the path, which should be unique, can have an access to the server.
>> Do you think that the documentation should warn the user about that?
>> This feature is about easing the management part of the socket paths
>> while throwing away the security aspect of it.
> 
> We could modify the documentation further.  But note that the 
> traditional way of putting the socket into /tmp has the same properties, 
> so this shouldn't be a huge shock.

One issue with them is that they interact differently with kernel 
namespaces than normal unix sockets do. Abstract sockets are handled by 
the network namespaces, and not the file system namespaces. But I am not 
sure that this is our job to document.

Andreas



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Dmitry Dolgov
Дата:
Сообщение: Re: remove spurious CREATE INDEX CONCURRENTLY wait
Следующее
От: Tom Lane
Дата:
Сообщение: Re: -O switch