Tom Lane wrote:
> Since the tables you need to touch are all shared, it's conceivable
> that
> this could be hacked around, but it seems awfully messy. Another
> consideration is that this'd significantly increase the amount of work
> done before validating that the connection request is authorized,
Yah, I thought the chicken-and-egg issue might be the nub of it - it
sure feels more secure to avoid accessing any tables at all 'til you
know what kind of access the user has.
- John Burger
MITRE