Re: [HACKERS] TODO list updated

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: kdebisschop(at)range(dot)infoplease(dot)com
Cc: pgman(at)candle(dot)pha(dot)pa(dot)us, peter_e(at)gmx(dot)net, scrappy(at)hub(dot)org, pgsql-hackers(at)postgresql(dot)org
Subject: Re: [HACKERS] TODO list updated
Date: 2000-01-13 18:38:23
Message-ID: 16269.947788703@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Karl DeBisschop <kdebisschop(at)range(dot)infoplease(dot)com> writes:
>> That's got a race condition: at the time you start the postmaster,
>> the postgres superuser hasn't got a password. A bad guy could get
>> in there and set the password the way *he* wanted it

> Or could `echo "ALTER USER ..." | standalone-backend` to the backend
> -- isn't that still a race condition?

No, not unless he's already either root or postgres. Ordinary other
users can't run a standalone backend in your database (that's one reason
why the toplevel data directory must always have permissions 700).

> And even if echo is a builtin in all shells, an alias will override
> the builtin, at least in bash. So if you machine has been penetrated
> to the point where the above race condition comes into play, you also
> cannot trust echo.

Again, if the attacker has already managed to modify your .profile,
then you've lost the game. What we're concerned about here is other
users on your machine or any of the machines that your pg_hba file
allows connections from. Running ps while you are doing initdb, for
example, doesn't require any special preconditions beyond a regular
user account on the same machine you are on.

regards, tom lane

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Lamar Owen 2000-01-13 19:47:54 Re: [HACKERS] TODO list updated
Previous Message Peter Eisentraut 2000-01-13 18:30:06 Re: [HACKERS] Copy from/to asymmetry