From: Bruce Momjian Date: Thu, 31 Jan 2008 23:03:16 +0000 (+0000) Subject: Update spoofing /tmp symlink instructions to be more specific about the X-Git-Url: http://waps.l3s.uni-hannover.de/gitweb/?a=commitdiff_plain;h=2ffd664e693c009e2a00cdf8f5ffb6b082ca1241;p=users%2Fbernd%2Fpostgres.git Update spoofing /tmp symlink instructions to be more specific about the name of the needed symlink file. --- diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml index f015133fb2..8d63c12864 100644 --- a/doc/src/sgml/runtime.sgml +++ b/doc/src/sgml/runtime.sgml @@ -1398,10 +1398,10 @@ $ kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`) that has write permission only for a trusted local user. This prevents a malicious user from creating their own socket file in that directory. If you are concerned that - some applications might still look in /tmp for the - socket file and hence be vulnerable to spoofing, create a symbolic link - during operating system startup in /tmp that points to - the relocated socket file. You also might need to modify your + some applications might still reference /tmp for the + socket file and hence be vulnerable to spoofing, during operating system + startup create symbolic link /tmp/.s.PGSQL.5432 that points + to the relocated socket file. You also might need to modify your /tmp cleanup script to preserve the symbolic link.