-
+
Operating System Environment
linkend="guc-unix-socket-directory">) that has write permission only
for a trusted local user. This prevents a malicious user from creating
their own socket file in that directory. If you are concerned that
- some applications might still look in /tmp> for the
- socket file and hence be vulnerable to spoofing, create a symbolic link
- during operating system startup in /tmp> that points to
- the relocated socket file. You also might need to modify your
+ some applications might still reference /tmp> for the
+ socket file and hence be vulnerable to spoofing, during operating system
+ startup create symbolic link /tmp/.s.PGSQL.5432> that points
+ to the relocated socket file. You also might need to modify your
/tmp> cleanup script to preserve the symbolic link.