From: | Stephan Szabo <sszabo(at)megazone23(dot)bigpanda(dot)com> |
---|---|
To: | Diego T(dot) <sebulba76it(at)yahoo(dot)it> |
Cc: | <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Postgres syscalls |
Date: | 2002-12-13 00:09:51 |
Message-ID: | 20021212160430.L13718-100000@megazone23.bigpanda.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Fri, 13 Dec 2002, [iso-8859-1] Diego T. wrote:
> Hello I'm an Italian student of computer science at
> University of Rome "La Sapienza". I've to analyze some
> daemons which run under root privileges with a tool
> developed by my departement. This tool intercepts
> critical syscalls, like Execve, and blocks illegal
> invocation of that primitives (E.g. Execve("/bin/sh"))
> performed by a daemon which runs under root
> privileges. This approach blocks buffer overflow
> attacks before they can complete (or I hope so). Now,
> the problem is that postgres doesn' t run under root
> privileges and that the tool intercepts only the
> syscalls invoked by a process with root privileges. Is
> possible to force postgres to run under root
> privileges? How can be done? I know my request is
> anomalous but i've to do this for my laboratory
> project course. I should be very grateful if you'll
> answer as soon as possible.
You could probably just hack out the checks in main/main.c
and recompile, but postgres does call system and such to do
things (like create databases) so I'm not sure it'd be terribly
useful for you.
From | Date | Subject | |
---|---|---|---|
Next Message | wade | 2002-12-13 00:16:55 | invalid tid errors. |
Previous Message | Diego T. | 2002-12-12 23:57:02 | Postgres syscalls |