| From: | Joe Conway <mail(at)joeconway(dot)com> |
|---|---|
| To: | Gregory Stark <stark(at)enterprisedb(dot)com> |
| Cc: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Stephen Frost <sfrost(at)snowman(dot)net>, Magnus Hagander <magnus(at)hagander(dot)net>, Robert Treat <xzilla(at)users(dot)sourceforge(dot)net>, pgsql-patches <pgsql-patches(at)postgresql(dot)org> |
| Subject: | Re: dblink connection security |
| Date: | 2007-07-09 03:49:00 |
| Message-ID: | 4691B02C.6090105@joeconway.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-patches |
Gregory Stark wrote:
> Consider a scenario like "package <x> uses dblink". Sysadmin follows
> instructions for package <x> and installs dblink. Now package <x>'s
> documentation isn't going to explain the second-order effects and discuss
> restricting who has access to dblink. The sysadmin has no particular interest
> in using dblink himself and probably will never read any dblink docs.
>
> On the other hand if dblink can't be executed by random users then when
> package x tells you to install dblink it will also tell you to grant access to
> the user that package runs as. The sysadmin can consider which users that
> should be.
>
See my last email...
Consider a scenario like "package <x> uses <arbitrary function y in an
untrusted language z>". Exact same concerns arise.
Joe
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Stephen Frost | 2007-07-09 03:55:28 | Re: dblink connection security |
| Previous Message | Gregory Stark | 2007-07-09 03:45:56 | Re: dblink connection security |