"Henry B. Hotz" <[EMAIL PROTECTED]> writes: > You know, I don't know what I was thinking when I sent this. My > apologies for the late correction. > > Anyone who has a copy of the "host" keys for a machine can > manufacture kerberos tickets for the "host" service on that machine > masquerading as absolutely anyone (including people who don't > exist). Same for the "postgres" keys, and if the postgres server can > steal the host keys (or vice versa) then it's even worse. > [snip...]
Maybe I'm too dense, but I don't see a conclusion here. Do we need to change our code, our docs, both, or neither? regards, tom lane ---------------------------(end of broadcast)--------------------------- TIP 2: Don't 'kill -9' the postmaster