Protection of debugging options - Mailing list pgsql-hackers

From Peter Eisentraut
Subject Protection of debugging options
Date
Msg-id Pine.LNX.4.21.0006061615560.3957-100000@localhost.localdomain
Whole thread Raw
Responses Re: Protection of debugging options
List pgsql-hackers
Every Joe User can currently run
   env PGOPTIONS='-d99 -tpa -tpl -te' psql

and stuff the server log with relative garbage that he will never be able
to see anyway.

As I don't believe it feasible to do superuser checking before the options
parsing it seems to me that these option in particular (and -s as well)
need to be "secure". Those desiring to diagnose transient problems can use
SET debug_level, etc. which does have a superuser check in place. For
permanent debug level changes there's of course this shiny new
configuration file and the HUP signal.

Comments?

-- 
Peter Eisentraut                  Sernanders väg 10:115
peter_e@gmx.net                   75262 Uppsala
http://yi.org/peter-e/            Sweden



pgsql-hackers by date:

Previous
From: "Robert B. Easter"
Date:
Subject: Odd release numbers for development versions?
Next
From: Peter Eisentraut
Date:
Subject: Re: day of week