Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

Commit 2b4ae9c

Browse files
committed
doc: requirepeer is a way to avoid spoofing
We already mentioned unix_socket_directories as an option. Reported-by: https://www.postgresql.org/message-id/45016837-6cf3-3136-f959-763d06a28076%402ndquadrant.com Backpatch-through: 9.6
1 parent 0d5afd3 commit 2b4ae9c

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

doc/src/sgml/runtime.sgml

+8-1
Original file line numberDiff line numberDiff line change
@@ -1913,7 +1913,7 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19131913
</para>
19141914

19151915
<para>
1916-
The simplest way to prevent spoofing for <literal>local</>
1916+
On way to prevent spoofing of <literal>local</>
19171917
connections is to use a Unix domain socket directory (<xref
19181918
linkend="guc-unix-socket-directories">) that has write permission only
19191919
for a trusted local user. This prevents a malicious user from creating
@@ -1925,6 +1925,13 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19251925
<filename>/tmp</> cleanup script to prevent removal of the symbolic link.
19261926
</para>
19271927

1928+
<para>
1929+
Another option for <literal>local</> connections is for clients to use
1930+
<link linkend="libpq-connect-requirepeer"><literal>requirepeer</></>
1931+
to specify the required owner of the server process connected to
1932+
the socket.
1933+
</para>
1934+
19281935
<para>
19291936
To prevent spoofing on TCP connections, the best solution is to use
19301937
SSL certificates and make sure that clients check the server's certificate.

0 commit comments

Comments
 (0)