> On 25 Jun 2022, at 03:08, Hannu Krosing <han...@google.com> wrote: > > Currently the file system access is controlled via being a SUPREUSER My 2 cents. Ongoing work on making superuser access unneeded seems much more relevant to me. IMO superuser == full OS access available from postgres process. I think there's uncountable set of ways to affect OS from superuser. E.g. you can create a TOAST value compressed by pglz that allows you to look few kilobytes before detoasted datum. Or make an archive_command = 'gcc my shell code'. It's not even funny to invent things that you can hack as a superuser. Best regards, Andrey Borodin.
- Re: Hardening PostgreSQL via (optional) ban on loca... David G. Johnston
- Re: Hardening PostgreSQL via (optional) ban on loca... Gurjeet Singh
- Re: Hardening PostgreSQL via (optional) ban on ... Hannu Krosing
- Re: Hardening PostgreSQL via (optional) ban... Gurjeet Singh
- Re: Hardening PostgreSQL via (optional) ban... Magnus Hagander
- Re: Hardening PostgreSQL via (optional) ban on ... David G. Johnston
- Re: Hardening PostgreSQL via (optional) ban... Hannu Krosing
- Re: Hardening PostgreSQL via (optional) ban on loca... Magnus Hagander
- Re: Hardening PostgreSQL via (optional) ban on ... Hannu Krosing
- Re: Hardening PostgreSQL via (optional) ban... Hannu Krosing
- Re: Hardening PostgreSQL via (optional) ban on local fil... Andrey Borodin
- Re: Hardening PostgreSQL via (optional) ban on local fil... Jeff Davis
- Re: Hardening PostgreSQL via (optional) ban on loca... Hannu Krosing
- Re: Hardening PostgreSQL via (optional) ban on ... Jeff Davis
- Re: Hardening PostgreSQL via (optional) ban on ... Robert Haas
- Re: Hardening PostgreSQL via (optional) ban... Hannu Krosing
- Re: Hardening PostgreSQL via (optional)... Jeff Davis
- Re: Hardening PostgreSQL via (optional) ban on ... Andres Freund
- Re: Hardening PostgreSQL via (optional) ban... Laurenz Albe
- Re: Hardening PostgreSQL via (optional)... Andres Freund
- Re: Hardening PostgreSQL via (opti... Laurenz Albe