spoofing when the socket file has been moved.
-
+
Operating System Environment
connections is to use a Unix domain socket directory (
linkend="guc-unix-socket-directory">) that has write permission only
for a trusted local user. This prevents a malicious user from creating
- their own socket file in that directory. For TCP connections the server
+ their own socket file in that directory. If you are concerned that
+ some applications might still look in /tmp> for the
+ socket file and hence be vulnerable to spoofing, create a symbolic link
+ during operating system startup in /tmp> that points to
+ the relocated socket file. You also might need to modify your
+ /tmp> cleanup script to preserve the symbolic link.
+
+
+ For TCP connections the server
must accept only
hostssl> connections (
linkend="auth-pg-hba-conf">) and have SSL
server.key (key) and