Of course you can still sort of see the SQL used in functions declared
SECURITY DEFINER, using debug_print_parse, but this would be opening
up a much more transparent way to do it.

Do I need to worry about this?

Dean

----------------------------------------
> Date: Wed, 9 Jul 2008 14:22:45 +0300
> From: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED]
> Subject: Re: [HACKERS] Auto-explain patch
> CC: [EMAIL PROTECTED]; [EMAIL PROTECTED]; pgsql-hackers@postgresql.org
> 
> On 7/9/08, ITAGAKI Takahiro  wrote:
>>  Dean Rasheed  wrote:
>>> * client_sql_trace = on | off - settable by a normal user to allow a
>> > client session to see the sql_trace output. If this parameter is on,
>> > the sql_trace will be logged as NOTICE output.
>>
>>
>> In terms of security, is it ok to show normal users SQLs used in functions
>>  that are owned by other users? Users can call not-owned functions only if
>>  they have EXECUTE privilege on them. -- presently we can see function
>>  bodies from pg_proc.prosrc freely, though.
> 
> Different owner is not a problem, but SECURITY DEFINER may be.
> 
> That can be solved by turning the setting off on entry to such function,
> by non-superuser.  Like we handle search_path.
> 
> -- 
> marko

_________________________________________________________________
Find the best and worst places on the planet
http://clk.atdmt.com/UKM/go/101719807/direct/01/
-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to