From: | Matthew Tice <mjtice(at)gmail(dot)com> |
---|---|
To: | pgsql-general(at)postgresql(dot)org |
Subject: | Re: What are best practices wrt passwords? |
Date: | 2024-10-16 19:07:37 |
Message-ID: | 2BB7312C-B811-4B16-B5BD-313582980112@gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general |
> On Oct 16, 2024, at 10:50 AM, Christophe Pettus <xof(at)thebuild(dot)com> wrote:
>
>
>
>> On Oct 16, 2024, at 09:47, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> wrote:
>> I believe it depends on your platform --- some BSDen are pretty
>> permissive about this, if memory serves. On a Linux box it seems
>> to work for processes owned by yourself even if you're not superuser.
>
> I just tried it on an (admittedly kind of old) Ubuntu system and MacOS 14, and it looks like shows everything owned by everyone, even from a non-sudoer user.
>
Interesting, that’s not my experience. Only root can see the env variables of another user.
Terminal 1
$ cat /etc/os-release
NAME="Ubuntu"
VERSION="20.04.6 LTS (Focal Fossa)"
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME="Ubuntu 20.04.6 LTS"
VERSION_ID="20.04"
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
VERSION_CODENAME=focal
UBUNTU_CODENAME=focal
$ whoami
testusr
$ export FOOBAR=true
$ bash
$ env | grep FOOBAR
FOOBAR=true
Terminal 2
$ whoami
mtice
$ ps e -U testusr | grep -c FOOBAR
0
$ sudo ps e -U testusr | grep -c FOOBAR
1
From | Date | Subject | |
---|---|---|---|
Next Message | Jacob Biesinger | 2024-10-16 19:24:32 | Re: serializable master and non-serializable hot standby: feasible set up? |
Previous Message | Tom Lane | 2024-10-16 18:47:05 | Re: What are best practices wrt passwords? |