| From: | Alvaro Herrera <alvherre(at)dcc(dot)uchile(dot)cl> |
|---|---|
| To: | Andrew Dunstan <andrew(at)dunslane(dot)net> |
| Cc: | pgsql-hackers(at)postgresql(dot)org |
| Subject: | Re: Stats Collector Error 7.4beta1 and 7.4beta2 |
| Date: | 2003-09-10 13:55:38 |
| Message-ID: | 20030910135538.GA2952@dcc.uchile.cl |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers |
On Wed, Sep 10, 2003 at 07:27:02AM -0400, Andrew Dunstan wrote:
> If someone can spoof the packet address isn't there also a possibility
> that they can read your packets and see your random signature?
Spoofing the packet source address is not quite the same as sniffing a
connection, which should be encrypted if you do not trust your
environment AFAIU.
> I'm not clear what would be gained by an attacker being able to insert
> such spoofed packets into the stream, though. IOW, how big is the security
> threat?
DoS caused by the autovacuum daemon running too much?
--
Alvaro Herrera (<alvherre[a]dcc.uchile.cl>)
"The Gord often wonders why people threaten never to come back after they've
been told never to return" (www.actsofgord.com)
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Tom Lane | 2003-09-10 14:03:18 | Re: Is it a memory leak in PostgreSQL 7.4beta? |
| Previous Message | Jeroen T. Vermeulen | 2003-09-10 13:21:52 | Re: 2-phase commit |