Re: Authenticating user `postgres'

From: Arcady Genkin <a(dot)genkin(at)utoronto(dot)ca>
To: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: pgsql-general(at)postgresql(dot)org
Subject: Re: Authenticating user `postgres'
Date: 2001-09-28 20:06:57
Message-ID: r1zlmizuljy.fsf@bashful.cdf.toronto.edu
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-general

Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> writes:

> Arcady Genkin <a(dot)genkin(at)utoronto(dot)ca> writes:
> > Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> writes:
> >> Offhand I'd think it foolish to make it easier to get into the
> >> superuser account than regular accounts anyway.
>
> > Not so much if the database only listens on unix domain socket, which
> > has tight permissions, and a UNIX user has to identify himself with a
> > valid password anyways.
>
> So? If you can trust local connections from the user who is superuser
> to be correctly authenticated, then you can also trust local connections
> from the users who are non-superusers. I really completely fail to see
> the point of requiring a password to connect to non-critical accounts
> while having no password (*LESS* security) for the critical superuser
> account.

Suppose that one of the non-superusers accounts is user `apache'.
There is a higher chance that this user account is compromised, than
the `postgres' account. I can see your point, though.
--
Arcady Genkin

In response to

Browse pgsql-general by date

  From Date Subject
Next Message Mihai Gheorghiu 2001-09-28 20:07:54 Triggers and rules
Previous Message Lamar Owen 2001-09-28 20:05:16 Re: postgresql.conf