Tom, > > I grow weary of repeating this: it's not about resource consumption, nor > > about potential security holes in plpgsql itself. It's about handing > > attackers the capability to further exploit *other* security holes. > > Well, without specific examples, I'm not sure I understand what plpgsql > buys you that you could not do other ways (e.g. generate_series() for > looping).
I have to agree with Greg here: I don't see what significant new security issues PL/pgSQL opens up. Certainly including PL/perl or PL/sh would, but PL/pgSQL? One of the reasons we advertise to use PostgreSQL is our ability to do sophisticated backend database things, which other OSDBs don't have. I agree that there should be some way to disable PL/pgSQL for "locked down" installations, but I think the majority of users want it to just be there. -- Josh Berkus PostgreSQL @ Sun San Francisco ---------------------------(end of broadcast)--------------------------- TIP 7: You can help support the PostgreSQL project by donating at http://www.postgresql.org/about/donate