Re: [PATCH] pgpassfile connection option - Mailing list pgsql-hackers

From Julian Markwort
Subject Re: [PATCH] pgpassfile connection option
Date
Msg-id ab86aa47-9c24-3fe9-378a-2eb353ecf608@uni-muenster.de
Whole thread Raw
In response to Re: [PATCH] pgpassfile connection option  (Robert Haas <robertmhaas@gmail.com>)
Responses Re: [PATCH] pgpassfile connection option  (Robert Haas <robertmhaas@gmail.com>)
List pgsql-hackers
On 09/26/2016 07:51 PM, Robert Haas wrote:
> However, they don't have
> to accept the possibility that arbitrary local files readable by the
> user ID will be used for authentication and/or disclosed; this patch
> would force them to accept that risk.
I do agree with you, however we might have to take a look at the 
parameter sslkey's implementation here as well - There are no checks in 
place to stop you from using rogue sslkey parameters.
I'd like to suggest having both of these parameters behave in a similar 
fashion. In order to achieve safe behaviour, we could implement the use 
of environment variables prohibiting the use of user-located pgpassfiles 
and sslkeys.
How about PGSECRETSLOCATIONLOCK ?



pgsql-hackers by date:

Previous
From: Etsuro Fujita
Date:
Subject: Re: postgres_fdw : altering foreign table not invalidating prepare statement execution plan.
Next
From: Heikki Linnakangas
Date:
Subject: Re: Logical tape pause/resume