File tree Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Original file line number Diff line number Diff line change 1- <!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.404 2008/01/31 17:22:43 momjian Exp $ -->
1+ <!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.405 2008/01/31 23:03:16 momjian Exp $ -->
22
33<chapter Id="runtime">
44 <title>Operating System Environment</title>
@@ -1398,10 +1398,10 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput
13981398 linkend="guc-unix-socket-directory">) that has write permission only
13991399 for a trusted local user. This prevents a malicious user from creating
14001400 their own socket file in that directory. If you are concerned that
1401- some applications might still look in <filename>/tmp</> for the
1402- socket file and hence be vulnerable to spoofing, create a symbolic link
1403- during operating system startup in <filename>/tmp</> that points to
1404- the relocated socket file. You also might need to modify your
1401+ some applications might still reference <filename>/tmp</> for the
1402+ socket file and hence be vulnerable to spoofing, during operating system
1403+ startup create symbolic link <filename>/tmp/.s.PGSQL.5432 </> that points
1404+ to the relocated socket file. You also might need to modify your
14051405 <filename>/tmp</> cleanup script to preserve the symbolic link.
14061406 </para>
14071407
You can’t perform that action at this time.
0 commit comments