Tom Lane wrote:
Magnus Hagander <[EMAIL PROTECTED]> writes:
Sure. But we *do* provide a way to work around it *if you have to*: use
SSL with trusted certificates. In the large number of cases where you
*don't* need to worry about it, there's no need to add any extra overhead.

And if you're going with SSL already, the extra overhead of TCP vs Unix
sockets shouldn't matter *at all*... So I don't really see a motivation
for us to support SSL over Unix sockets, if it adds any complexity to
the code.

Well, the problem with the current behavior is that the client app can
"require SSL", but the request is silently ignored if the connection is
over Unix socket.  So you might think you're secure when you aren't.

I think that the reason we don't support SSL over Unix socket is mainly
that we thought it was useless; but this discussion has exposed reasons
to use it.  So I'm for just eliminating the asymmetry.



I have no problem with that. But it does seem to me that we are going about this all wrong. The OP proposed a "solution" which was intended to ensure at the server end that an untrusted user could not spoof the postmaster if the postmaster were not running. Putting the onus of this on clients seems wrong. I don't have any experience with SELinux, but my impression is that it can be used to control who or what can open files, sockets etc. On Linux at least this strikes me as a more productive approach to the original problem, as it would put the solution in the SA's hands. Maybe other Unices and Windows have similar capabilities?

cheers

andrew

---------------------------(end of broadcast)---------------------------
TIP 9: In versions below 8.0, the planner will ignore your desire to
      choose an index scan if your joining column's datatypes do not
      match

Reply via email to