From: Bruce Momjian Date: Thu, 31 Jan 2008 17:22:43 +0000 (+0000) Subject: Document the idea of creating a symbolic link in /tmp to prevent server X-Git-Tag: REL8_3_0~12 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=8e9c7fe982facb662f7cf88b4fc72c258e03e14b;p=thirdparty%2Fpostgresql.git Document the idea of creating a symbolic link in /tmp to prevent server spoofing when the socket file has been moved. --- diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml index 22a640d6ee9..d4877580203 100644 --- a/doc/src/sgml/runtime.sgml +++ b/doc/src/sgml/runtime.sgml @@ -1,4 +1,4 @@ - + Operating System Environment @@ -1397,7 +1397,16 @@ $ kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`) that has write permission only for a trusted local user. This prevents a malicious user from creating - their own socket file in that directory. For TCP connections the server + their own socket file in that directory. If you are concerned that + some applications might still look in /tmp for the + socket file and hence be vulnerable to spoofing, create a symbolic link + during operating system startup in /tmp that points to + the relocated socket file. You also might need to modify your + /tmp cleanup script to preserve the symbolic link. + + + + For TCP connections the server must accept only hostssl connections () and have SSL server.key (key) and