Re: Securing "make check" (CVE-2014-0067)

Поиск
Список
Период
Сортировка
От Andrew Dunstan
Тема Re: Securing "make check" (CVE-2014-0067)
Дата
Msg-id 5312224C.2080607@dunslane.net
обсуждение исходный текст
Ответ на Re: Securing "make check" (CVE-2014-0067)  (Tom Lane <tgl@sss.pgh.pa.us>)
Ответы Re: Securing "make check" (CVE-2014-0067)  (Magnus Hagander <magnus@hagander.net>)
Список pgsql-hackers
On 03/01/2014 12:29 PM, Tom Lane wrote:

>
> In the case of Unix systems, there is a *far* simpler and more portable
> solution technique, which is to tell the test postmaster to put its socket
> in some non-world-accessible directory created by the test scaffolding.


+1 - I'm all for KISS.

>
> Of course that doesn't work for Windows, which is why we looked at the
> random-password solution.  But I wonder whether we shouldn't use the
> nonstandard-socket-location approach everywhere else, and only use random
> passwords on Windows.  That would greatly reduce the number of cases to
> worry about for portability of the password-generation code; and perhaps
> we could also push the crypto issue into reliance on some Windows-supplied
> functionality (though I'm just speculating about that part).


See for example 
<http://msdn.microsoft.com/en-us/library/windows/desktop/aa379942%28v=vs.85%29.aspx>

cheers

andrew




В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Re: Securing "make check" (CVE-2014-0067)
Следующее
От: Magnus Hagander
Дата:
Сообщение: Re: Securing "make check" (CVE-2014-0067)