Re: plpgsql by default

From: "Dave Page" <dpage(at)vale-housing(dot)co(dot)uk>
To: "Peter Eisentraut" <peter_e(at)gmx(dot)net>, <pgsql-hackers(at)postgresql(dot)org>
Cc: "Tom Lane" <tgl(at)sss(dot)pgh(dot)pa(dot)us>, "David Fetter" <david(at)fetter(dot)org>, "Jim C(dot) Nasby" <jnasby(at)pervasive(dot)com>, "Joshua D(dot) Drake" <jd(at)commandprompt(dot)com>, <andrew(at)supernews(dot)com>
Subject: Re: plpgsql by default
Date: 2006-04-12 10:54:30
Message-ID: E7F85A1B5FF8D44C8A1AF6885BC9A0E4011C9C2A@ratbert.vale-housing.co.uk
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

> -----Original Message-----
> From: pgsql-hackers-owner(at)postgresql(dot)org
> [mailto:pgsql-hackers-owner(at)postgresql(dot)org] On Behalf Of
> Peter Eisentraut
> Sent: 12 April 2006 11:33
> To: pgsql-hackers(at)postgresql(dot)org
> Cc: Tom Lane; David Fetter; Jim C. Nasby; Joshua D. Drake;
> andrew(at)supernews(dot)com
> Subject: Re: [HACKERS] plpgsql by default
>
> Am Dienstag, 11. April 2006 23:20 schrieb Tom Lane:
> > In the end it's only one small component of security, but
> any security
> > expert will tell you that you take all the layers of
> security that you
> > can get.
>
> I think what the security experts are saying is that you need
> a thorough evaluation of assets, attackers, risks, and
> countermeasures, and I don't see that here.

Regardless of any evaluations, or any proven or thoretical risks in any
given code it's Basic Security 101 stuff to disable/remove anything that
is not required in a system to immediately reduce the number of
potential attacks that could be made. Microsoft are the classic example
- they enabled pretty much everything by default in Windows leaving it
vulnerable to attack through services many people weren't using (NetBios
on a single home user machine for example). You install a modern version
of Windows now though and you'll see virtually every network service is
disabled, or even uninstalled by default, leaving it up the user to
install as required. In addition of course, those services are still
subject to the normal bug fixes and updates for those users that do
require them.

Keeping PostgreSQL as secure as possible out of the box pretty much
requires us to do the same in my mind - if an major feature such as
pl/pgsql is easy for the user to enable should they want it, then it
should be disabled by default to minimise the number of attack vectors
for all those users that do not want it.

Regards, Dave

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Gaetano Mendola 2006-04-12 11:07:39 Re: [HACKERS] RH9 postgresql 8.0.7 rpm
Previous Message Peter Eisentraut 2006-04-12 10:32:52 Re: plpgsql by default