Re: ODBC Driver exposes tables and views that a user does

From: Shachar Shemesh <psql(at)shemesh(dot)biz>
To: "Harris, Richard" <Richard_Harris(at)adp(dot)com>
Cc: pgsql-odbc(at)postgresql(dot)org
Subject: Re: ODBC Driver exposes tables and views that a user does
Date: 2005-05-27 07:28:20
Message-ID: 4296CC14.6030708@shemesh.biz
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-odbc

Harris, Richard wrote:

>Hi,
>
>PostgreSQL server 7.4.2
>psqlODBC driver: 7.03.02.00
>
>I created a database user in a postgresql cluster. I granted that user
>SELECT permission to a few views. I created a DSN for that user to
>connect to postgreSQL from a Windows PC. When I use the DSN in MS Access
>to link to the views, the Link Tables list includes many tables and
>views that the user has no permission to access. Is this a defect in the
>ODBC driver? Is there a work around for this?
>
>
As far as security models are concerned, a driver should never impose
the security policy. The reason for that is very simple - bypassing the
driver will give you access to things you thought were secure. A driver
should give the user the maximal power available to her. If Postgresql
allows a user to get a list of views that the user has no permission to
access, then it's the driver's job to give this list.

If you think this security consideration is wrong, the place to complain
about that is pgsql-hackers or pgsql-users. There is nothing ODBC can do
about this.

>Thanks,
>Rich Harris
>
>
Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting ltd.
Have you backed up today's work? http://www.lingnu.com/backup.html

In response to

Browse pgsql-odbc by date

  From Date Subject
Next Message Brian J. Erickson 2005-05-27 15:34:29 IM003 when using ODBC
Previous Message Jacques I. Peterson, V 2005-05-27 00:54:47 Breaking News