Re: For review: Server instrumentation patch

From: "Magnus Hagander" <mha(at)sollentuna(dot)net>
To: "Tom Lane" <tgl(at)sss(dot)pgh(dot)pa(dot)us>
Cc: "Andrew Dunstan" <andrew(at)dunslane(dot)net>, "Andreas Pflug" <pgadmin(at)pse-consulting(dot)de>, "Bruce Momjian" <pgman(at)candle(dot)pha(dot)pa(dot)us>, "Dave Page" <dpage(at)vale-housing(dot)co(dot)uk>, "PostgreSQL-development" <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: For review: Server instrumentation patch
Date: 2005-07-25 14:47:30
Message-ID: 6BCB9D8A16AC4241919521715F4D8BCE6C77C2@algol.sollentuna.se
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

> >> That'd be fine with me --- but we have to introduce that
> >> *before* we add obvious new security risks, not after.
>
> > So what do you think of the proposed GUC?
>
> Well, it has more or less the same problem as the GUC in the
> COPY-only-to-given-places proposal, which is that GUCs were
> never intended to prevent superusers from changing their
> values. Right now a remote superuser can't change a
> postmaster-start-time-only GUC, but if we ever introduce a
> real remote admin facility I'd expect it to support that, so
> it seems like a GUC intended not to be changeable by
> superusers would have to be its own special category. I'd be
> inclined not to expose it as a GUC at all, but make it some
> other mechanism (maybe a postmaster command-line switch only?)

If you make it a postmaster-start-only, and it restricts the
remote-admin-functionality, then you will not be able to change it
remotely.

Making it a GUC makes it a whole lot easier to deal with for the admin -
especially in cases like win32 when it's not as easy to edit the startup
parameters for service based processes.

> > Or what about a parameter to restrict both COPY and the utility
> > functions to certain subdirs only? (BTW, I was under the impression
> > that the admin functions were restricted to the pgdata directory
> > already, but I could be wrong - I don't have the latest
> version of the
> > patch around)
>
> We've gone back and forth on that with respect to the
> proposed admin functions, and I forget which way the current
> patch is. But it doesn't do much to stop the privilege
> escalation risk: if you can write into any of the same
> directories you can LOAD from, the risk exists. (And
> detecting whether two paths overlap is very hard in general,
> considering directory symlinks, AFS mounts, etc, so we
> probably couldn't hope to forbid LOADing from any writable directory.)

Right. That's gotta be at least as bad as dealing with URLs, and we've
seen how many bugs there have been in those in pretty much all
webservers...

//Magnus

Browse pgsql-hackers by date

  From Date Subject
Next Message Tom Lane 2005-07-25 14:51:35 Re: For review: Server instrumentation patch
Previous Message Bruce Momjian 2005-07-25 14:37:07 Re: For review: Server instrumentation patch