| From: | Neil Conway <neilc(at)samurai(dot)com> |
|---|---|
| To: | Oliver Elphick <olly(at)lfix(dot)co(dot)uk> |
| Cc: | PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org> |
| Subject: | Re: [Fwd: Bug#184566: security threat to postgresql |
| Date: | 2003-03-21 21:13:50 |
| Message-ID: | 1048281230.27986.25.camel@tokyo |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers |
On Fri, 2003-03-21 at 16:06, Oliver Elphick wrote:
> Is this paranoia, or is it a valid security point. Any comments,
> please?
A little from column A, a little from column B, IMHO.
> if an application is linked against libpq, then the user is able to
> specify environmental variables to override the defaults
Note that this overrides the *default* -- if the application specifies
the full set of data of the host it wants to connect to, the
environmental vars shouldn't be used, AFAIK.
> if the user runs the program with the environment variable PORT set to
> 23423, he can install his own program on that port listening for the
> password! he can then use that password to connect to the real database
> and delete everything.
How is that any different than the user altering the database hostname
the client connects to, and setting up a fake DB server on that host?
Many database applications allow that...
Cheers,
Neil
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Barry Lind | 2003-03-21 21:32:29 | Re: [INTERFACES] Roadmap for FE/BE protocol redesign |
| Previous Message | Oliver Elphick | 2003-03-21 21:06:31 | [Fwd: Bug#184566: security threat to postgresql applications] |