Re: Spoofing as the postmaster - Mailing list pgsql-hackers

From Tomasz Ostrowski
Subject Re: Spoofing as the postmaster
Date
Msg-id 20071227100906.GB20344@batory.org.pl
Whole thread Raw
In response to Re: Spoofing as the postmaster  (Tom Lane <tgl@sss.pgh.pa.us>)
Responses Re: Spoofing as the postmaster  (Bruce Momjian <bruce@momjian.us>)
List pgsql-hackers
On Sun, 23 Dec 2007, Tom Lane wrote:

> ISTM we have these action items:
> 1. Improve the code so that SSL authentication can be used across a
> Unix-socket connection (we can disable encryption though).

I've just realised that there's a problem with SSL with disabled
encryption on a unix socket / localhost connections for cpu-saving.
Any local user using this attack would be able to eavesdrop
everything comming through a socket.

If an attacker just acts as a tunnel, highjacking a unix-socket and
talking to a server using any other interface (or the other way
around), then he would not be able to modify information flow, but he
would be able to read and save everything going to and from a server.
It is again not obvious as normally local connections are not
susceptible to eavesdropping. And could go unnoticed for a long time
as everything would just work normally.

So I think no cpu-saving by turning off encryption should be done.

And this would all not help for a denial-of-service attack.

Regards
Tometzky
-- 
...although Eating Honey was a very good thing to do, there was a
moment just before you began to eat it which was better than when you
were...                                                     Winnie the Pooh


pgsql-hackers by date:

Previous
From: Andrew Dunstan
Date:
Subject: Re: Binary data type with other output method
Next
From: Andreas 'ads' Scherbaum
Date:
Subject: Re: Binary data type with other output method