Re: plpgsql by default (was: Re: Remote administration contrib module)

Поиск
Список
Период
Сортировка
От Andrew - Supernews
Тема Re: plpgsql by default (was: Re: Remote administration contrib module)
Дата
Msg-id slrne3m8eo.2as.andrew+nonews@atlantis.supernews.net
обсуждение исходный текст
Ответ на Re: Remote administration contrib module  (Peter Eisentraut <peter_e@gmx.net>)
Список pgsql-hackers
On 2006-04-11, Tom Lane <tgl@sss.pgh.pa.us> wrote:
> Andrew - Supernews <andrew+nonews@supernews.com> writes:
>> On 2006-04-10, Bruce Momjian <pgman@candle.pha.pa.us> wrote:
>>>> [ security ]
>>> It actually is the reason I have heard.
>
>> And it was duly debunked.
>
> That is the reasoning, and personally I agree with it.  You don't leave
> sharp objects sitting around if you have no need to have them out.
> The availability of plpgsql or other PLs makes for a significant jump
> in what a bad guy can do if he gets access to the database,

Example please.

Last time this was discussed, the claimed examples were things like
running infinite loops as a resource exhaustion attack, which is pretty
trivial to do in plain SQL functions or even in plain SQL without functions,
and running things like brute-force attacks on password hashes (which also
isn't hard using plain SQL functions).

-- 
Andrew, Supernews
http://www.supernews.com - individual and corporate NNTP services


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Tom Lane
Дата:
Сообщение: Re: plpgsql by default (was: Re: Remote administration contrib module)
Следующее
От: "Joshua D. Drake"
Дата:
Сообщение: Re: plpgsql by default