From: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
---|---|
To: | Stephen Frost <sfrost(at)snowman(dot)net> |
Cc: | Robert Haas <robertmhaas(at)gmail(dot)com>, Michael Paquier <michael(dot)paquier(at)gmail(dot)com>, Vaishnavi Prabakaran <vaishnaviprabakaran(at)gmail(dot)com>, PostgreSQL mailing lists <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Simplify ACL handling for large objects and removal of superuser() checks |
Date: | 2017-11-10 01:00:10 |
Message-ID: | 24479.1510275610@sss.pgh.pa.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Stephen Frost <sfrost(at)snowman(dot)net> writes:
> I'm guessing no, which essentially means that *we* consider access to
> lo_import/lo_export to be equivilant to superuser and therefore we're
> not going to implement anything to try and prevent the user who has
> access to those functions from becoming superuser. If we aren't willing
> to do that, then how can we really say that there's some difference
> between access to these functions and being a superuser?
We seem to be talking past each other. Yes, if a user has malicious
intentions, it's possibly to parlay lo_export into obtaining a superuser
login (I'm less sure that that's necessarily true for lo_import).
That does NOT make it "equivalent", except perhaps in the view of someone
who is only considering blocking malevolent actors. It does not mean that
there's no value in preventing a task that needs to run lo_export from
being able to accidentally destroy any data in the database. There's a
range of situations where you are concerned about accidents and errors,
not malicious intent; but your argument ignores those use-cases.
To put it more plainly: your argument is much like saying that a person
who knows a sudo password might as well do everything they ever do as
root.
regards, tom lane
From | Date | Subject | |
---|---|---|---|
Next Message | Peter Geoghegan | 2017-11-10 01:13:40 | Re: [HACKERS] pgsql: Fix freezing of a dead HOT-updated tuple |
Previous Message | Andres Freund | 2017-11-10 00:53:09 | Re: [HACKERS] pgsql: Fix freezing of a dead HOT-updated tuple |