Re: Securing "make check" (CVE-2014-0067)
От | Andrew Dunstan |
---|---|
Тема | Re: Securing "make check" (CVE-2014-0067) |
Дата | |
Msg-id | 5312224C.2080607@dunslane.net обсуждение исходный текст |
Ответ на | Re: Securing "make check" (CVE-2014-0067) (Tom Lane <tgl@sss.pgh.pa.us>) |
Ответы |
Re: Securing "make check" (CVE-2014-0067)
|
Список | pgsql-hackers |
On 03/01/2014 12:29 PM, Tom Lane wrote: > > In the case of Unix systems, there is a *far* simpler and more portable > solution technique, which is to tell the test postmaster to put its socket > in some non-world-accessible directory created by the test scaffolding. +1 - I'm all for KISS. > > Of course that doesn't work for Windows, which is why we looked at the > random-password solution. But I wonder whether we shouldn't use the > nonstandard-socket-location approach everywhere else, and only use random > passwords on Windows. That would greatly reduce the number of cases to > worry about for portability of the password-generation code; and perhaps > we could also push the crypto issue into reliance on some Windows-supplied > functionality (though I'm just speculating about that part). See for example <http://msdn.microsoft.com/en-us/library/windows/desktop/aa379942%28v=vs.85%29.aspx> cheers andrew
В списке pgsql-hackers по дате отправления: