File tree Expand file tree Collapse file tree 1 file changed +8
-1
lines changed Expand file tree Collapse file tree 1 file changed +8
-1
lines changed Original file line number Diff line number Diff line change @@ -1922,7 +1922,7 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19221922 </para>
19231923
19241924 <para>
1925- The simplest way to prevent spoofing for <literal>local</>
1925+ On way to prevent spoofing of <literal>local</>
19261926 connections is to use a Unix domain socket directory (<xref
19271927 linkend="guc-unix-socket-directories">) that has write permission only
19281928 for a trusted local user. This prevents a malicious user from creating
@@ -1934,6 +1934,13 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19341934 <filename>/tmp</> cleanup script to prevent removal of the symbolic link.
19351935 </para>
19361936
1937+ <para>
1938+ Another option for <literal>local</> connections is for clients to use
1939+ <link linkend="libpq-connect-requirepeer"><literal>requirepeer</></>
1940+ to specify the required owner of the server process connected to
1941+ the socket.
1942+ </para>
1943+
19371944 <para>
19381945 To prevent spoofing on TCP connections, the best solution is to use
19391946 SSL certificates and make sure that clients check the server's certificate.
You can’t perform that action at this time.
0 commit comments