"Henry B. Hotz" <hbhotz(at)oxy(dot)edu> writes:
> You know, I don't know what I was thinking when I sent this. My
> apologies for the late correction.
>
> Anyone who has a copy of the "host" keys for a machine can
> manufacture kerberos tickets for the "host" service on that machine
> masquerading as absolutely anyone (including people who don't
> exist). Same for the "postgres" keys, and if the postgres server can
> steal the host keys (or vice versa) then it's even worse.
> [snip...]
Maybe I'm too dense, but I don't see a conclusion here. Do we need to
change our code, our docs, both, or neither?
regards, tom lane