| From: | Pavel Stehule <pavel(dot)stehule(at)gmail(dot)com> |
|---|---|
| To: | PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org> |
| Cc: | Takahiro Itagaki <itagaki(dot)takahiro(at)gmail(dot)com> |
| Subject: | SQL/MED security |
| Date: | 2010-07-22 14:32:07 |
| Message-ID: | AANLkTik82d_jd1AyROoNMHTWrAsYXvuMgKIIyfJppYBE@mail.gmail.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers |
Hello
I see a SQL/MED security very unclean - it have to be very vell documented :(
I have a database on port 5401. With user Tom - it require a password
[pavel(at)nemesis pgsql]$ psql-dev1 postgres -U tom
Password for user tom:
Timing is on.
psql-dev1 (9.0devel)
Type "help" for help.
postgres=>
I can't to do selects to table from this database as some non superuser
create foreign table test_table(id numeric) server dev1;
postgres=# create user mapping for public server dev1;
CREATE USER MAPPING
Time: 2,507 ms
postgres=# select count(*) from test_table;
count
---------
1000002
(1 row)
postgres=# create user mapping for tom server dev1 options (user
'tom', password 'tom');
CREATE USER MAPPING
Time: 32,929 ms
postgres=# set role to tom;
SET
Time: 0,450 ms
postgres=> select * from test_table;
ERROR: password is required
DETAIL: Non-superuser cannot connect if the server does not request a password.
HINT: Target server's authentication method must be changed.
What I doing wrong?
Regards
Pavel Stehule
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Markus Wanner | 2010-07-22 15:01:47 | Re: dynamically allocating chunks from shared memory |
| Previous Message | Greg Smith | 2010-07-22 13:59:08 | Re: dynamically allocating chunks from shared memory |