Re: [HACKERS] Virus Emails

2002-07-26 Thread Tom Lane

"Christopher Kings-Lynne" <[EMAIL PROTECTED]> writes:
> I seem to be getting virus emails that pretend to be one of your guys.  eg.
> I get them from T.Ishii and N.Conway, etc.  Anyone out there on the list who
> should perhaps scan their computer? :)

One of the nastier aspects of the Klez virus is that it searches
accessible files and webpages for email addresses.  It doesn't just spam
all the addresses it can find --- it spams each address with a false
"From:" that's a found-nearby address.  So mail-list archives are a
gold mine for it: it can spam you with a false "From:" that you will
probably recognize.

However, even a trivial look at the detail mail headers (Received: etc)
will convince you that the spam did not originate from the claimed
"From:" address.  If you care to post a few sets of complete headers,
we can probably triangulate pretty quickly on the virus-infected loser
who's originating these messages.

regards, tom lane

---(end of broadcast)---
TIP 3: if posting/reading through Usenet, please send an appropriate
subscribe-nomail command to [EMAIL PROTECTED] so that your
message can get through to the mailing list cleanly



Re: [HACKERS] Question about LWLockAcquire's use of semaphores instead of spinlocks

2002-07-26 Thread Tom Lane

"Robert E. Bruccoleri" <[EMAIL PROTECTED]> writes:
> On SGI multiprocessor machines, I suspect that a spinlock
> implementation of LWLockAcquire would give better performance than
> using IPC semaphores.  Is there any specific reason that a spinlock
> could not be used in this context?

Are you confusing LWLockAcquire with TAS spinlocks?

If you're saying that we don't have an implementation of TAS for
SGI hardware, then feel free to contribute one.  If you are wanting to
replace LWLocks with spinlocks, then you are sadly mistaken, IMHO.

regards, tom lane

---(end of broadcast)---
TIP 1: subscribe and unsubscribe commands go to [EMAIL PROTECTED]



[HACKERS] Virus Emails

2002-07-26 Thread Christopher Kings-Lynne

Hi guys,

I seem to be getting virus emails that pretend to be one of your guys.  eg.
I get them from T.Ishii and N.Conway, etc.  Anyone out there on the list who
should perhaps scan their computer? :)

Chris



---(end of broadcast)---
TIP 5: Have you checked our extensive FAQ?

http://www.postgresql.org/users-lounge/docs/faq.html



[HACKERS] Question about LWLockAcquire's use of semaphores instead of spinlocks

2002-07-26 Thread Robert E. Bruccoleri

On SGI multiprocessor machines, I suspect that a spinlock
implementation of LWLockAcquire would give better performance than
using IPC semaphores.  Is there any specific reason that a spinlock
could not be used in this context?

+-++
| Robert E. Bruccoleri, Ph.D. | email: [EMAIL PROTECTED]|
| P.O. Box 314| URL:   http://www.congen.com/~bruc |
| Pennington, NJ 08534||
+-++

---(end of broadcast)---
TIP 4: Don't 'kill -9' the postmaster



[HACKERS] regd count(count(*)) in group by

2002-07-26 Thread Yuva Chandolu

Hi,

We have a query "select count(count(*)) from test group by
trunc(test_date)". This works fine with Oracle but when moving to postgres I
changed it to "select count(count(*)) from test group by date_trunc('day',
test_date)" but I get the following error

ERROR:  Aggregate function calls may not be nested

Can some one help me...

Thanks
Yuva

---(end of broadcast)---
TIP 5: Have you checked our extensive FAQ?

http://www.postgresql.org/users-lounge/docs/faq.html



Re: [HACKERS] regd count(count(*)) in group by

2002-07-26 Thread Rod Taylor

Try this:

SELECT count(*)
  FROM (
SELECT count(*)
FROM test
GROUP BY date_trunc('day', test_date)
) as qry;


On Fri, 2002-07-26 at 16:03, Yuva Chandolu wrote:
> Hi,
> 
> We have a query "select count(count(*)) from test group by
> trunc(test_date)". This works fine with Oracle but when moving to postgres I
> changed it to "select count(count(*)) from test group by date_trunc('day',
> test_date)" but I get the following error
> 
> ERROR:  Aggregate function calls may not be nested
> 
> Can some one help me...
> 
> Thanks
> Yuva
> 
> ---(end of broadcast)---
> TIP 5: Have you checked our extensive FAQ?
> 
> http://www.postgresql.org/users-lounge/docs/faq.html
> 



---(end of broadcast)---
TIP 2: you can get off all lists at once with the unregister command
(send "unregister YourEmailAddressHere" to [EMAIL PROTECTED])



Re: [HACKERS] Password sub-process ...

2002-07-26 Thread Roderick A. Anderson

On Fri, 26 Jul 2002, Jan Wieck wrote:

> What would be good is IMHO to have GRANT|REVOKE CONNECT which defaults
> to REVOKE, so only superusers and the DB owner can connect, but that the
> owner later can change it without the need to edit hba.conf.

Oh, yes.  Me too please.  I think something close to this is coming with 
schemes - well at least my take on it indicates that.


Rod
-- 
  "Open Source Software - Sometimes you get more than you paid for..."


---(end of broadcast)---
TIP 2: you can get off all lists at once with the unregister command
(send "unregister YourEmailAddressHere" to [EMAIL PROTECTED])



[HACKERS] Password sub-process ...

2002-07-26 Thread Marc G. Fournier


Something to maybe add to the TODO list, if someone has the
time/inclination to work on it ...

The problem with the current auth system, as I see it, is that you can't
easily have seperate user lists and passwords per database ... its shared
across the system ...

The closest you can get is to have a database defined as 'password' in
pg_hba.conf, with an external password file from pg_shadow, which, for the
most part, is good ... but it doesn't lend itself well to a 'hands off'
server ...

Right now, with v7.2, we have two 'sub-processes' that start up for stats
collection ... has anyone thought about adding a 3rd as a password server?

Basically, it would be used to manage the pg_hba.conf file itself *while*
the server is/was live ...

For instance, CREATE DATABASE would need to get extended to have
something like "WITH AUTH '{trust|password|ident}' FROM ''" added to
it, which would add an appropriate line to pg_hba.conf ...

The database owner would have the ability to add users if (and only if)
the database was setup for 'password', and the password daemon would
automatically modify the password file(s) for that database ..

What would be even more cool ... to be able to do something like:

CREATE USER  FROM  WITH PASSWORD 

which, if it didn't exist, would create a line in pg_hba.conf of:

host  password

and create a  password file with that person in it ...





---(end of broadcast)---
TIP 3: if posting/reading through Usenet, please send an appropriate
subscribe-nomail command to [EMAIL PROTECTED] so that your
message can get through to the mailing list cleanly



Re: [HACKERS] Password sub-process ...

2002-07-26 Thread Bruno Wolff III

On Fri, Jul 26, 2002 at 10:48:53 -0300,
  "Marc G. Fournier" <[EMAIL PROTECTED]> wrote:
> 
> Something to maybe add to the TODO list, if someone has the
> time/inclination to work on it ...
> 
> The problem with the current auth system, as I see it, is that you can't
> easily have seperate user lists and passwords per database ... its shared
> across the system ...

If you look at the 7.3 docs you will see that you will be able to restrict
access to databases by user or group name. If you use group name and have
one group per database you will be able to administer access pretty easily.
If you have a lot of databases you can use group names matching database
names and not have to touch your conf file when making new databases.

---(end of broadcast)---
TIP 4: Don't 'kill -9' the postmaster



Re: [HACKERS] SET LOCAL again

2002-07-26 Thread Tom Lane

Peter Eisentraut <[EMAIL PROTECTED]> writes:
> As an alternative syntax I can suggest

> SET name TO value [ ON COMMIT RESET ];

Ugh.  Why can't we stick with SET LOCAL?

regards, tom lane

---(end of broadcast)---
TIP 6: Have you searched our list archives?

http://archives.postgresql.org



Re: [HACKERS] Password sub-process ...

2002-07-26 Thread Rod Taylor

On Fri, 2002-07-26 at 12:55, Marc G. Fournier wrote:
> On Fri, 26 Jul 2002, Tom Lane wrote:
> 
> > Rod Taylor <[EMAIL PROTECTED]> writes:
> > > This still doesn't allow john on db1 to be a different user than john on
> > > db2.  To accomplish that (easily) we still need to install different
> > > instances for each database.
> >
> > Some people think that cross-database user names are a feature, not
> > a bug.  I cannot see any way to change that without creating huge
> > backward-compatibility headaches --- and it's not at all clear to
> > me that it's a step forward, anyway.
> >
> > I think that it might be worth adding a CONNECT privilege at the
> > database level; that together with Bruce's recent revisions to
> > pg_hba.conf ought to be a pretty good improvement.

> Also, I thnk I might have missed the point of the whole CONNECT privilege
> thing ... if I have two ppl named joe on the system, each with different
> passwords, how does the CONNECT know which one is the one that has access
> to that database?

Well.. right now we call one db1_joe and db2_joe.  I meant adding the
ability to lock some users to specific DBs -- and only exist there. 
Authentication would use destination DB as well as username.

Where DB is null, the user is a global user.  Usernames would still be
unique per database.



---(end of broadcast)---
TIP 3: if posting/reading through Usenet, please send an appropriate
subscribe-nomail command to [EMAIL PROTECTED] so that your
message can get through to the mailing list cleanly



Re: [HACKERS] Password sub-process ...

2002-07-26 Thread Jan Wieck

"Marc G. Fournier" wrote:
> 
> Something to maybe add to the TODO list, if someone has the
> time/inclination to work on it ...
> 
> The problem with the current auth system, as I see it, is that you can't
> easily have seperate user lists and passwords per database ... its shared
> across the system ...

I don't see a problem with that in general. Other databases (like
Informix) do it even worse and you need a UNIX or NIS account where the
password is held!

What would be good is IMHO to have GRANT|REVOKE CONNECT which defaults
to REVOKE, so only superusers and the DB owner can connect, but that the
owner later can change it without the need to edit hba.conf.


Jan

-- 

#==#
# It's easier to get forgiveness for being wrong than for being right. #
# Let's break this rule - forgive me.  #
#== [EMAIL PROTECTED] #

---(end of broadcast)---
TIP 4: Don't 'kill -9' the postmaster