Tom Lane wrote:
> "Henry B. Hotz" <[EMAIL PROTECTED]> writes:
>> You know, I don't know what I was thinking when I sent this.  My  
>> apologies for the late correction.
>> Anyone who has a copy of the "host" keys for a machine can  
>> manufacture kerberos tickets for the "host" service on that machine  
>> masquerading as absolutely anyone (including people who don't  
>> exist).  Same for the "postgres" keys, and if the postgres server can  
>> steal the host keys (or vice versa) then it's even worse.
>> [snip...]
> Maybe I'm too dense, but I don't see a conclusion here.  Do we need to
> change our code, our docs, both, or neither?

I don't think we do. If you use service keys per our documentation, you
should be fine. And if someone owns your host keys, you lost already.


---------------------------(end of broadcast)---------------------------
TIP 3: Have you checked our extensive FAQ?


Reply via email to