Mark Mielke <[EMAIL PROTECTED]> writes: > What has come out for me is that this isn't UNIX socket specific at all > (although there may be UNIX socket specific options available). The > standard PostgreSQL port is above 1024, and anybody could > bind()/listen()/accept() on it, assuming it is not running.
Right. The real bottom line is that a socket in /tmp is exactly as secure as a localhost TCP port. There is no value in debating moving the default socket location unless you are prepared to also relocate the default port to below 1024 (and even that helps only on Unix-y platforms). I remain of the opinion that what we should do about this is support SSL usage over sockets and document the issues. regards, tom lane ---------------------------(end of broadcast)--------------------------- TIP 1: if posting/reading through Usenet, please send an appropriate subscribe-nomail command to [EMAIL PROTECTED] so that your message can get through to the mailing list cleanly