|
|
|
@ -1922,7 +1922,7 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433 |
|
|
|
|
</para> |
|
|
|
|
|
|
|
|
|
<para> |
|
|
|
|
The simplest way to prevent spoofing for <literal>local</> |
|
|
|
|
On way to prevent spoofing of <literal>local</> |
|
|
|
|
connections is to use a Unix domain socket directory (<xref |
|
|
|
|
linkend="guc-unix-socket-directories">) that has write permission only |
|
|
|
|
for a trusted local user. This prevents a malicious user from creating |
|
|
|
@ -1934,6 +1934,13 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433 |
|
|
|
|
<filename>/tmp</> cleanup script to prevent removal of the symbolic link. |
|
|
|
|
</para> |
|
|
|
|
|
|
|
|
|
<para> |
|
|
|
|
Another option for <literal>local</> connections is for clients to use |
|
|
|
|
<link linkend="libpq-connect-requirepeer"><literal>requirepeer</></> |
|
|
|
|
to specify the required owner of the server process connected to |
|
|
|
|
the socket. |
|
|
|
|
</para> |
|
|
|
|
|
|
|
|
|
<para> |
|
|
|
|
To prevent spoofing on TCP connections, the best solution is to use |
|
|
|
|
SSL certificates and make sure that clients check the server's certificate. |
|
|
|
|