Noah Misch <n...@leadboat.com> writes: > On Mon, Mar 26, 2012 at 07:53:25PM -0400, Robert Haas wrote: >> I think the more important question is a policy question: do we want >> it to work like this?
> The DBA can customize policy by revoking public execute permissions on > pg_catalog.pg_terminate_backend and interposing a security definer function > implementing his checks. For the population who will want something different > here, that's adequate. I don't particularly trust solutions that involve modifying system-defined objects. In this case, a dump and reload would be sufficient to create a security hole, because the REVOKE would go away. (Now, I'm not particularly concerned about the issue in the first place. Just pointing out that for someone who is, the above isn't a great solution.) regards, tom lane -- Sent via pgsql-hackers mailing list (firstname.lastname@example.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers