From: | Andrew Dunstan <andrew(at)dunslane(dot)net> |
---|---|
To: | Hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: dropping a user causes pain (#2) |
Date: | 2003-08-12 18:57:02 |
Message-ID: | 3F39387E.2030608@dunslane.net |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
ISTM there's a difference between an object without an (exisiting) owner
and an object whose owner doesn't currently have the privileges required
to create it, although maybe there's a good case for a script to detect
the latter as a part of a good administrator's arsenal of tricks in
keeping things sane and clean.
andrew
Peter Eisentraut wrote:
>Tom Lane writes:
>
>
>
>>The advantage here is that the sysid assigned to the user would remain
>>present in pg_shadow and couldn't accidentally be assigned to a new
>>user. This would prevent the problem of new users "inheriting"
>>permissions and even object ownership from deleted users due to chance
>>coincidence of sysid.
>>
>>
>
>But how does one actually get rid of the privileges?
>
>Btw., the problem is going to get worse if we get nested roles, roles with
>grant options, and possibly other parts of the enhanced privilege
>facilities. For example, if you remove a user from a role/group, you
>would need to search the entire database cluster for any privileges
>granted through that group that this user had used to create some kind of
>permanent state. I'm not sure if we want to cover all of these cases with
>various "this link no longer exists" flags, especially since later on the
>link could be reestablished.
>
>
>
From | Date | Subject | |
---|---|---|---|
Next Message | Bruce Momjian | 2003-08-12 19:20:40 | Re: reuse sysids security hole? |
Previous Message | wind.claudio@inwind.it | 2003-08-12 17:00:35 | Statement-level Triggers |