Re: Spoofing as the postmaster

Поиск
Список
Период
Сортировка
От Mark Mielke
Тема Re: Spoofing as the postmaster
Дата
Msg-id 476FDC9A.7090703@mark.mielke.cc
обсуждение исходный текст
Ответ на Re: Spoofing as the postmaster  (Gregory Stark <stark@enterprisedb.com>)
Ответы Re: Spoofing as the postmaster  (Bruce Momjian <bruce@momjian.us>)
Список pgsql-hackers
Gregory Stark wrote: <blockquote cite="mid:87prww1zks.fsf@oxford.xeocode.com" type="cite"><pre wrap="">"Mark Mielke"
<aclass="moz-txt-link-rfc2396E" href="mailto:mark@mark.mielke.cc"><mark@mark.mielke.cc></a> writes:
</pre><blockquotetype="cite"><pre wrap="">UNIX socket kernel credential passing was mentioned in an earlier post, but
I
didn't see it raised again.    </pre></blockquote><pre wrap="">
I mentioned getsockopt(SO_PEERCRED) which isn't the same as credential
passing. It just tells you what uid is on the other end of your unix domain
socket.

I think it's much more widespread and portable than credential passing which
was a BSD feature which allowed you to send along your kernel credentials to
another process. So you could, for example, open a file in psql then pass the
file descriptor to the backend to have the backend read directly from the
file</pre></blockquote> I agree - I forgot there were different flavours. I think any of these are just as good as SSL
withpublic key authentication, and perhaps a lot cheaper in terms of performance. The only piece of information missing
isthe uid to compare against, which may as well be provided in the db open parameters the same as any other parameters
mightbe provided.<br /><br /> Cheers,<br /> mark<br /><br /><pre class="moz-signature" cols="72">-- 
 
Mark Mielke <a class="moz-txt-link-rfc2396E" href="mailto:mark@mielke.cc"><mark@mielke.cc></a>
</pre>

В списке pgsql-hackers по дате отправления:

Предыдущее
От: Gregory Stark
Дата:
Сообщение: Re: Spoofing as the postmaster
Следующее
От: Bruce Momjian
Дата:
Сообщение: Re: Spoofing as the postmaster