> Tom Lane wrote:
>   >Peter Eisentraut <[EMAIL PROTECTED]> writes:
>   >> Mikheev, Vadim writes:
>   >>> Yes, there should be permission checking - I'll add it later (in 7.1)
>   >>> if no one else.
>   >
>   >> Should be simple enough.  Is this okay:
>   >
>   >Actually, I think a more interesting question is "should CHECKPOINT
>   >have permission restrictions?  If so, what should they be?"
>   >
>   >A quite relevant precedent is that Unix systems (at least the ones
>   >I've used) do not restrict who can call sync().
> 
> What about DoS attacks?  What would be the effect of someone's setting
> off an infinite loop of CHECKPOINTs?

Don't we have bigger DoS attacks?  Certainly SELECT cash_out(1) is a
much bigger one.

-- 
  Bruce Momjian                        |  http://candle.pha.pa.us
  [EMAIL PROTECTED]               |  (610) 853-3000
  +  If your life is a hard drive,     |  830 Blythe Avenue
  +  Christ can be your backup.        |  Drexel Hill, Pennsylvania 19026

Reply via email to