[HACKERS] setuid functions

2002-04-10 Thread Andreas Scherbaum
Hello, i searched around about privileges for functions, but it seems, that there is nothing available in the 7.2.x series. So my question: Is it possible to execute a function (in this case a C function) with permissions of the function creater instead of the user who's actual using function?

Re: [HACKERS] Setuid functions

2001-06-24 Thread Philip Warner
At 13:28 24/06/01 +0200, Peter Eisentraut wrote: > >If someone wants to implement them, be my guest. I originally needed them >for fixing the RI permission problems, but they couldn't be used for that >after all. > They were part of a larger permissions overhaul that Jan proposed - IIRC, at the

Re: [HACKERS] Setuid functions

2001-06-23 Thread Philip Warner
As a matter of interest, whatever happened to Perter's & Jan's plans for setuid functions? >From memory, Jan's proposal was shelved in favour of something Peter had previously proposed, is that right? Philip Warner

Re: [HACKERS] Setuid functions

2001-06-20 Thread Ross J. Reedstrom
On Thu, Jun 21, 2001 at 09:44:43AM +0800, Christopher Kings-Lynne wrote: > > Okay, what I'm thinking is to have a pair of commands added to > > PL/pgSQL. For > > the sake of example we'll call them: > > > > ENABLE PRIVLEDGE --> Sets user ID to that of the function's owner > > DISABLE PRIVLEDGE

Re: [HACKERS] Setuid functions

2001-06-20 Thread Mark Volpe
Okay, what I'm thinking is to have a pair of commands added to PL/pgSQL. For the sake of example we'll call them: ENABLE PRIVLEDGE --> Sets user ID to that of the function's owner DISABLE PRIVLEDGE --> Restores the original UID I saw something like this being used in the referential integrity c

[HACKERS] Setuid functions

2001-06-13 Thread Mark Volpe
I know this topic was discussed a few months ago, but I'm wondering if any decisions have been reached on if, how, and when setuid functions and triggers might be implemented. If not, I have an idea to throw at it. Thanks, Mark ---(end of broadcast)---

AW: AW: AW: [HACKERS] "setuid" functions, a solution to the RI privil ege problem

2000-09-19 Thread Zeugswetter Andreas SB
> > Since you can write extensions to PostgreSQL that reach far into the OS, > > it does make sense to execute those extensions under a "non priviledged" > > user, and not postgres. > > Agreed. > > > This OS user would somehow be tied to the username that the client > > passes as his credential

Re: AW: AW: [HACKERS] "setuid" functions, a solution to the RI privil ege problem

2000-09-18 Thread Peter Eisentraut
Zeugswetter Andreas SB writes: > Since you can write extensions to PostgreSQL that reach far into the OS, > it does make sense to execute those extensions under a "non priviledged" > user, and not postgres. Agreed. > This OS user would somehow be tied to the username that the client > passes as

AW: AW: [HACKERS] "setuid" functions, a solution to the RI privilege problem

2000-09-18 Thread Zeugswetter Andreas SB
> But the pg_shadow authentication is based on credentials > provided by the > client whereas what you propose here would run on the server, so this > doesn't make sense. Since you can write extensions to PostgreSQL that reach far into the OS, it does make sense to execute those extensions und

Re: AW: [HACKERS] "setuid" functions, a solution to the RI privilege problem

2000-09-17 Thread Peter Eisentraut
Zeugswetter Andreas SB writes: > Imho it is fine to get rid of the usesysid in our internal > authorization system, but we should not get rid of the only field that > can tie a db user to an os user. Imho we should not do a "by name" > lookup and eliminate the field. Um, well, the only possible