File tree Expand file tree Collapse file tree 1 file changed +8
-1
lines changed Expand file tree Collapse file tree 1 file changed +8
-1
lines changed Original file line number Diff line number Diff line change @@ -1913,7 +1913,7 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19131913 </para>
19141914
19151915 <para>
1916- The simplest way to prevent spoofing for <literal>local</>
1916+ On way to prevent spoofing of <literal>local</>
19171917 connections is to use a Unix domain socket directory (<xref
19181918 linkend="guc-unix-socket-directories">) that has write permission only
19191919 for a trusted local user. This prevents a malicious user from creating
@@ -1925,6 +1925,13 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19251925 <filename>/tmp</> cleanup script to prevent removal of the symbolic link.
19261926 </para>
19271927
1928+ <para>
1929+ Another option for <literal>local</> connections is for clients to use
1930+ <link linkend="libpq-connect-requirepeer"><literal>requirepeer</></>
1931+ to specify the required owner of the server process connected to
1932+ the socket.
1933+ </para>
1934+
19281935 <para>
19291936 To prevent spoofing on TCP connections, the best solution is to use
19301937 SSL certificates and make sure that clients check the server's certificate.
You can’t perform that action at this time.
0 commit comments