Re: postgresql.key secure storage

From: Adam Tauno Williams <awilliam(at)opengroupware(dot)us>
To: pgsql-general(at)postgresql(dot)org
Subject: Re: postgresql.key secure storage
Date: 2009-09-13 12:39:31
Message-ID: 1252845571.14166.11.camel@linux-m3mt
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

> An application using libpq would require that the private unencrypted key be
> deployed to the end user, together with the public key and trust cert. This
> would mean if the end user is curious enough and computer litterate, he can
> bypass the client application and make a direct connection to the server with
> psql for example. It's then possible to issue commands like TRUNCATE TABLE...

Sorry, I don't know anything about postgresql.key; but regardless of
how you identify and authenticate you need to secure your database from
rogue user actions.

A user must have the TRUNCATE privilege to truncate a table or be the
tables owner.

OGo=> truncate table person;
ERROR: must be owner of relation person

In response to

Browse pgsql-general by date

  From Date Subject
Next Message Alban Hertroys 2009-09-13 12:55:29 How to match sets?
Previous Message Adam Tauno Williams 2009-09-13 12:23:23 Re: postgresql.key secure storage