Commit 162dc314 authored by Bruce Momjian's avatar Bruce Momjian

Update spoofing /tmp symlink instructions to be more specific about the

name of the needed symlink file.
parent 06462f51
<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.404 2008/01/31 17:22:43 momjian Exp $ --> <!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.405 2008/01/31 23:03:16 momjian Exp $ -->
<chapter Id="runtime"> <chapter Id="runtime">
<title>Operating System Environment</title> <title>Operating System Environment</title>
...@@ -1398,10 +1398,10 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput ...@@ -1398,10 +1398,10 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput
linkend="guc-unix-socket-directory">) that has write permission only linkend="guc-unix-socket-directory">) that has write permission only
for a trusted local user. This prevents a malicious user from creating for a trusted local user. This prevents a malicious user from creating
their own socket file in that directory. If you are concerned that their own socket file in that directory. If you are concerned that
some applications might still look in <filename>/tmp</> for the some applications might still reference <filename>/tmp</> for the
socket file and hence be vulnerable to spoofing, create a symbolic link socket file and hence be vulnerable to spoofing, during operating system
during operating system startup in <filename>/tmp</> that points to startup create symbolic link <filename>/tmp/.s.PGSQL.5432</> that points
the relocated socket file. You also might need to modify your to the relocated socket file. You also might need to modify your
<filename>/tmp</> cleanup script to preserve the symbolic link. <filename>/tmp</> cleanup script to preserve the symbolic link.
</para> </para>
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment