Skip to content

Commit 2b4ae9c

Browse files
committed
doc: requirepeer is a way to avoid spoofing
We already mentioned unix_socket_directories as an option. Reported-by: https://www.postgresql.org/message-id/45016837-6cf3-3136-f959-763d06a28076%402ndquadrant.com Backpatch-through: 9.6
1 parent 0d5afd3 commit 2b4ae9c

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

doc/src/sgml/runtime.sgml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1913,7 +1913,7 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19131913
</para>
19141914

19151915
<para>
1916-
The simplest way to prevent spoofing for <literal>local</>
1916+
On way to prevent spoofing of <literal>local</>
19171917
connections is to use a Unix domain socket directory (<xref
19181918
linkend="guc-unix-socket-directories">) that has write permission only
19191919
for a trusted local user. This prevents a malicious user from creating
@@ -1925,6 +1925,13 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19251925
<filename>/tmp</> cleanup script to prevent removal of the symbolic link.
19261926
</para>
19271927

1928+
<para>
1929+
Another option for <literal>local</> connections is for clients to use
1930+
<link linkend="libpq-connect-requirepeer"><literal>requirepeer</></>
1931+
to specify the required owner of the server process connected to
1932+
the socket.
1933+
</para>
1934+
19281935
<para>
19291936
To prevent spoofing on TCP connections, the best solution is to use
19301937
SSL certificates and make sure that clients check the server's certificate.

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy