Re: [HACKERS] SSL over Unix-domain sockets - Mailing list pgsql-patches

From Andrew Dunstan
Subject Re: [HACKERS] SSL over Unix-domain sockets
Date
Msg-id 478F83EE.3090904@dunslane.net
Whole thread Raw
In response to Re: [HACKERS] SSL over Unix-domain sockets  (Tom Lane <tgl@sss.pgh.pa.us>)
Responses Re: [HACKERS] SSL over Unix-domain sockets
Re: [HACKERS] SSL over Unix-domain sockets
List pgsql-patches

Tom Lane wrote:
> Bruce Momjian <bruce@momjian.us> writes:
>
>> Peter Eisentraut wrote:
>>
>>> How does that prevent spoofing?
>>>
>
>
>> It creates a lock file that is the same name as the socket file that a
>> default-configured client would use, so it prevents a spoofed socket
>> from being created.
>>
>
> Only if the attacker didn't get there first.  I think this idea is
> nothing but a crude kluge anyway...
>
>

I agree. I remain of the opinion that this is not a problem than can be
solved purely within the bounds of postgres.

cheers

andrew

pgsql-patches by date:

Previous
From: Tom Lane
Date:
Subject: Re: [HACKERS] SSL over Unix-domain sockets
Next
From: Simon Riggs
Date:
Subject: Doc patch for Bug 3877