Re: Upcoming re-releases

From: Florian Weimer <fw(at)deneb(dot)enyo(dot)de>
To: Martijn van Oosterhout <kleptog(at)svana(dot)org>
Cc: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Andrew Dunstan <andrew(at)dunslane(dot)net>, Alvaro Herrera <alvherre(at)commandprompt(dot)com>, Christopher Kings-Lynne <chriskl(at)familyhealth(dot)com(dot)au>, Devrim GUNDUZ <devrim(at)commandprompt(dot)com>, "pgsql-hackers(at)postgresql(dot)org" <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: Upcoming re-releases
Date: 2006-02-11 17:21:04
Message-ID: 877j81ak1r.fsf@mid.deneb.enyo.de
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

* Martijn van Oosterhout:

> Well, I guess it's an issue. At least it's not suceptable to the
> standard symlink attacks. There is in general no way of knowing if the
> server you are connecting to is what you think it is (except via SSL
> maybe?).

For local (i.e. UNIX domain socket) connections, there is -- just use
a hard-coded path where each directory is only writable by root or by
the PostgreSQL superuser (/var/run in Debian is not world-writable,
for instance).

> The good thing is that if you're using md5 auth they can't grab your
> password.

The password is probably of little concern if you use UNIX domain
sockets. But feeding wrong data to the application might trigger
interesting things.

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Magnus Hagander 2006-02-11 17:21:42 Re: Upcoming re-releases
Previous Message Greg Stark 2006-02-11 17:20:09 Re: PostgreSQL 8.0.6 crash