Re: postgres uptime - Mailing list pgsql-hackers

From Tom Lane
Subject Re: postgres uptime
Date
Msg-id 16287.1092976811@sss.pgh.pa.us
Whole thread Raw
In response to Re: postgres uptime  ("Marc G. Fournier" <scrappy@postgresql.org>)
Responses Re: postgres uptime  (Richard Huxton <dev@archonet.com>)
List pgsql-hackers
"Marc G. Fournier" <scrappy@postgresql.org> writes:
> Good point(s) ... but, what would that give an attacker?  Being able to 
> isolate the random seed, that is?

Well, the random seed determines the salt values that will be used to
challenge password logins.  So it might help you execute a
password-replay attack, ie try just at the time when you'll be offered a
salt that you saw before.  But I'm not a blackhat by nature and I'm sure
I'm missing a lot of possibilities.

> Does anyone have any 'benefits' to implementing such a thing that we can 
> list?  The cons appear to be easy, what about pros?

That's exactly what's bugging me --- I have not seen any particularly
strong defense of why we *should* have this function.

Your suggestion in another mail of restricting it to superusers would
eliminate most or all of the security gripes I'm raising.  Whether that
still leaves it useful to the original suggestor's purpose, I dunno...
        regards, tom lane


pgsql-hackers by date:

Previous
From: Philip Warner
Date:
Subject: Re: tablespace and sequences?
Next
From: Tom Lane
Date:
Subject: Re: tablespace and sequences?