Re: Exposure related to GUC value of ssl_passphrase_command - Mailing list pgsql-hackers

From Moon, Insung
Subject Re: Exposure related to GUC value of ssl_passphrase_command
Date
Msg-id CAEMmqBuhSWSbdmyzjHwmPTEcxpEbJAZ2wOhE6HsuHZiwKf9Fmw@mail.gmail.com
Whole thread Raw
In response to Re: Exposure related to GUC value of ssl_passphrase_command  (Fujii Masao <masao.fujii@oss.nttdata.com>)
List pgsql-hackers
Dear Kuroda-san, Fujii-san
Thank you for review and commit!
#Oops.. Sorry..This mail thread has been spammed in Gmail.

I'll go to submit a new discussion after found which case could leak
about the GUC parameters related to ssl_*.
Please wait a bit.

Best regards.
Moon.

On Mon, Mar 9, 2020 at 11:43 AM Fujii Masao <masao.fujii@oss.nttdata.com> wrote:
>
>
>
> On 2020/02/14 10:31, Moon, Insung wrote:
> > Dear Hackers.
> >
> > Thank you for an response.
> > I registered this entry in commifest of 2020-03.
> > # I registered in the security part, but if it is wrong, sincerely
> > apologize for this.
> >
> > And I'd like to review show authority to ssl_ * later and discuss it
> > in a separate thread.
>
> So, you are planning to start new discussion about this?
>
> Regards,
>
> --
> Fujii Masao
> NTT DATA CORPORATION
> Advanced Platform Technology Group
> Research and Development Headquarters



pgsql-hackers by date:

Previous
From: Magnus Hagander
Date:
Subject: Re: pg_stat_progress_basebackup - progress reporting forpg_basebackup, in the server side
Next
From: Masahiko Sawada
Date:
Subject: Re: logical copy_replication_slot issues