On Fri, Nov 13, 2009 at 11:47 AM, Tom Lane <t...@sss.pgh.pa.us> wrote:

> Joe Miller <joe.d.mil...@gmail.com> writes:
> > I have a PostgreSQL installation for which I would like to limit local
> > domain socket access to the postgres user and members of the "myadmin"
> > group. I've modified pg_hba.conf to trust local domain socket
> connections,
> > and changed these settings in postgresql.conf:
> > unix_socket_group = 'myadmin'
> > unix_socket_permissions = 0770
>
> Looks reasonable.
>
> > When I look at the socket file in /tmp, I see the following:
> > srwx------  1 postgres postgres    0 Nov 13 10:03 .s.PGSQL.5432
>
> Huh, did you restart the server?  Are you sure you modified the right
> config file?  Those settings obviously didn't "take".
>
> Definitely the right file, and I've restarted multiple times. If I set
this:

#unix_socket_group = ''
unix_socket_permissions = 0770

...everything works as I expect. I have access logged in as either root or
postgres, but get "permission denied" if I'm logged in as a myadmin user.

If I set this:

unix_socket_group = 'myadmin'
unix_socket_permissions = 0777

...connection is refused for all accounts.  For this config, I'd expect to
see the socket owned by the myadmin group, but I should have access from any
account, correct?


Joe

Reply via email to