Peter Eisentraut wrote:
> I found an old patch on my disk to enable SSL over Unix-domain sockets.
> 
> Remember, about a year ago it was discussed that there might also be 
> man-in-the-middle or fake-server attacks using Unix-domain sockets, 
> because usually anyone can start a server in /tmp.  After an extensive 
> discussion (mainly about moving the socket out of /tmp by default; 
> please don't start that again), it was determined that using SSL server 
> verification would be the proper solution and it fact works without 
> problems.  Except that the start-up overhead was increased significantly 
> (because of the initial key exchange and session key setup etc.).
> 
> Back then we didn't really have a good solution, but I figured since 8.4 
> rearranges the SSL connection parameters anyway, we could stick that in 
> there.
> 
> I imagine for example, we could invent an additional sslmode of the sort 
> prefer-but-not-if-local-socket, which could be the default.
> 
> The other question is whether sslverify=cn makes sense, but that may be 
> up to the user to find out.

I thought the logical solution to this was to place the socket in a
secure directory and not bother with SSL at all.

-- 
  Bruce Momjian  <br...@momjian.us>        http://momjian.us
  EnterpriseDB                             http://enterprisedb.com

  + If your life is a hard drive, Christ can be your backup. +

-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to