Tom Lane wrote:
> Bruce Momjian <[EMAIL PROTECTED]> writes:
> > Tom Lane wrote:
> >> I'm pretty much against allowing configuration editing from remote
> >> altogether.
> 
> > Why can't they just use COPY to replace the contents of pg_hba.conf now?
> 
> If you've write-protected it, that doesn't work.
> 
> Also, COPY insists on an absolute path, and if the attacker doesn't know
> the value of $PGDATA or $HOME then he'll have some difficulty doing
> anything much with it.  I thought that the handy default of $PGDATA in
> the proposed functions was pretty unwise all by itself --- if they don't
> require absolute paths then that's still another new door we'll be opening.

I think he wanted $PGDATA default so a remote user could find the log
location without a problem.  I would prefer to see something specific in
the file name passed to identify PGDATA, but I don't have a problem with
the substitution.  Thinking we have security because they can't guess
pgdata seems like security through obscurity to me.

-- 
  Bruce Momjian                        |  http://candle.pha.pa.us
  [EMAIL PROTECTED]               |  (610) 359-1001
  +  If your life is a hard drive,     |  13 Roberts Road
  +  Christ can be your backup.        |  Newtown Square, Pennsylvania 19073

---------------------------(end of broadcast)---------------------------
TIP 9: the planner will ignore your desire to choose an index scan if your
      joining column's datatypes do not match

Reply via email to