From: | Stephen Frost <sfrost(at)snowman(dot)net> |
---|---|
To: | Joe Conway <mail(at)joeconway(dot)com> |
Cc: | Gregory Stark <stark(at)enterprisedb(dot)com>, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Magnus Hagander <magnus(at)hagander(dot)net>, Robert Treat <xzilla(at)users(dot)sourceforge(dot)net>, pgsql-patches <pgsql-patches(at)postgresql(dot)org> |
Subject: | Re: dblink connection security |
Date: | 2007-07-09 14:12:00 |
Message-ID: | 20070709141200.GW4887@tamriel.snowman.net |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-patches |
* Joe Conway (mail(at)joeconway(dot)com) wrote:
> Get serious. Internal functions are specifically designed and maintained to
> be safe within the confines of the database security model. We are
> discussing extensions to the core, all of which must be installed by
> choice, by a superuser.
Extensions should also be designed and maintained to be safe within the
confines of the database security model. Having to be installed by a
superuser doesn't change that. I would consider it a serious risk which
would need to be fixed if, for example, a function in PostGIS was found
to allow priviledge escalation by a user. Claiming it was installed "by
choice, by a superuser" doesn't change that.
It's about as good as saying "Well, an admin had to install PostgreSQL
on the system, by choice, and therefore we don't need to worry about PG
allowing someone remote shell access to the system".
Thanks,
Stephen
From | Date | Subject | |
---|---|---|---|
Next Message | Gregory Stark | 2007-07-09 14:18:52 | Re: dblink connection security |
Previous Message | Zdenek Kotala | 2007-07-09 14:05:43 | Re: script binaries renaming |