From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Peter Eisentraut <peter_e(at)gmx(dot)net> |
Cc: | Bruce Momjian <pgman(at)candle(dot)pha(dot)pa(dot)us>, PostgreSQL Development <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Summary of new configuration file and data directory locations |
Date: | 2002-02-08 17:28:41 |
Message-ID: | 24430.1013189321@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Peter Eisentraut <peter_e(at)gmx(dot)net> writes:
> So the premise is that in theory any file can live anywhere. And the
> access permissions of a file are solely controlled by its own permission
> bits and ownership, not what directory it may live in. Ultimately, the
> former way is more secure.
<<itch>> I guess my thoughts on this are colored by bad experience with
tools that are sloppy about preserving ownership/permissions on edited
files. (I can recall being burnt this way by both Emacs and HP's "SAM"
admin tool. Perhaps recent versions don't have those bugs anymore.)
I am not at all convinced that "the former way is more secure" in
reality, even if it's cleaner in theory.
Can't we do both? If the default setup is to put config files in
a Postgres-specific directory, then let's make the default arrangement
be that that directory is Postgres-owned, mode 700, *and* the config
files are Postgres-owned and mode 600. Anyone who wants to back off
from that is welcome to take responsibility for any security holes
they've created.
> 2. Make sure the user account you created in step 1 can read the
> configuration files. There are a few ways to make this happen:
> a. Make the configuration files world-readable.
I'd prefer you not recommend that at all, and certainly not as the
first alternative.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | mkscott | 2002-02-08 17:36:00 | Re: Threaded PosgreSQL server |
Previous Message | Teodor Sigaev | 2002-02-08 17:23:40 | Re: GiST on 64-bit box |