On Mon, Nov 21, 2022 at 4:05 PM Bryn Llewellyn <b...@yugabyte.com> wrote:

>
> I believe that the fact that a superuser's ability to start a session can
> be limited by what the "hba_file" says is critical here—together with the
> fact that the ability to edit this file is governed by the regime of O/S
> users and file privileges. Maybe this is the key to the effectively
> tamper-proof implementation of the scheme that David recommends. (Having
> said this, there's always the "set role" backdoor.)
>

If you are worried about back-doors here you gave the wrong people
superuser.  That may be unavoidable, but this scheme really isn't about
bullet-proofing security.  It's about ease of administration and knowing
just who all has permission do what on a server by inspecting its role
table.

Yes, you should lock-down pg_hba.conf to avoid other people without
superuser from being able to easily hack into the system using one of these
accounts (admittedly, a decent reason to limit how many there are, but all
of them should be equally/maximally secure so it isn't that strong an
argument).

David J.

Reply via email to