Re: [HACKERS] SSL over Unix-domain sockets

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Bruce Momjian <bruce(at)momjian(dot)us>
Cc: Peter Eisentraut <peter_e(at)gmx(dot)net>, PostgreSQL-patches <pgsql-patches(at)postgresql(dot)org>, Mark Mielke <mark(at)mark(dot)mielke(dot)cc>
Subject: Re: [HACKERS] SSL over Unix-domain sockets
Date: 2008-01-17 16:31:40
Message-ID: 9905.1200587500@sss.pgh.pa.us
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers pgsql-patches

Bruce Momjian <bruce(at)momjian(dot)us> writes:
> Peter Eisentraut wrote:
>> How does that prevent spoofing?

> It creates a lock file that is the same name as the socket file that a
> default-configured client would use, so it prevents a spoofed socket
> from being created.

Only if the attacker didn't get there first. I think this idea is
nothing but a crude kluge anyway...

regards, tom lane

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Andrew Dunstan 2008-01-17 16:35:58 Re: [HACKERS] SSL over Unix-domain sockets
Previous Message Pavel Stehule 2008-01-17 16:21:55 Re: proposal for 8.4: PL/pgSQL - statement CASE

Browse pgsql-patches by date

  From Date Subject
Next Message Andrew Dunstan 2008-01-17 16:35:58 Re: [HACKERS] SSL over Unix-domain sockets
Previous Message Bruce Momjian 2008-01-17 16:10:47 Re: [HACKERS] SSL over Unix-domain sockets