Re: [HACKERS] SSL over Unix-domain sockets

From: Andrew Dunstan <andrew(at)dunslane(dot)net>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: Bruce Momjian <bruce(at)momjian(dot)us>, Peter Eisentraut <peter_e(at)gmx(dot)net>, PostgreSQL-patches <pgsql-patches(at)postgresql(dot)org>, Mark Mielke <mark(at)mark(dot)mielke(dot)cc>
Subject: Re: [HACKERS] SSL over Unix-domain sockets
Date: 2008-01-17 16:35:58
Message-ID: 478F83EE.3090904@dunslane.net
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers pgsql-patches

Tom Lane wrote:
> Bruce Momjian <bruce(at)momjian(dot)us> writes:
>
>> Peter Eisentraut wrote:
>>
>>> How does that prevent spoofing?
>>>
>
>
>> It creates a lock file that is the same name as the socket file that a
>> default-configured client would use, so it prevents a spoofed socket
>> from being created.
>>
>
> Only if the attacker didn't get there first. I think this idea is
> nothing but a crude kluge anyway...
>
>

I agree. I remain of the opinion that this is not a problem than can be
solved purely within the bounds of postgres.

cheers

andrew

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Joshua D. Drake 2008-01-17 16:37:55 Re: proposal for 8.4: PL/pgSQL - statement CASE
Previous Message Tom Lane 2008-01-17 16:31:40 Re: [HACKERS] SSL over Unix-domain sockets

Browse pgsql-patches by date

  From Date Subject
Next Message Kevin Grittner 2008-01-17 16:44:16 Re: OUTER JOIN performance regression remains in 8.3beta4
Previous Message Tom Lane 2008-01-17 16:31:40 Re: [HACKERS] SSL over Unix-domain sockets