From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Mr Dash Four <mr(dot)dash(dot)four(at)googlemail(dot)com> |
Cc: | pgsql-general(at)postgresql(dot)org |
Subject: | Re: strange permission error |
Date: | 2012-10-02 14:01:47 |
Message-ID: | 20075.1349186507@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general |
Mr Dash Four <mr(dot)dash(dot)four(at)googlemail(dot)com> writes:
>> if you broke the permissions on the pg_catalog so badly that the SQL
>> planner can't look up the data types of the fields of your own tables,
>> well, thats just wrong.
> What's the alternative?
Perhaps more careful thought about your threat model?
> I am not willing to let an arbitrary program
> using connection credentials, which have the ability to read my entire
> system catalogue. What happens if that connection is hijacked by an
> attacker?
1. Use SSL connections, with appropriate certificate verification at
both ends.
2. If somebody manages to hijack your connection, you have much worse
problems than whether they can read your system catalogs. They can at
least copy, and probably modify, your user data. The catalogs are
unlikely to contain anything that's very interesting to an attacker
who knows enough about your operations to hijack a connection in the
first place.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Arvind Singh | 2012-10-02 14:02:12 | Game Server Lags |
Previous Message | Willy-Bas Loos | 2012-10-02 13:24:02 | Re: insert ... returning in plpgsql |