From 162dc31428d5250444600c9e7f228be08437f924 Mon Sep 17 00:00:00 2001 From: Bruce Momjian Date: Thu, 31 Jan 2008 23:03:16 +0000 Subject: [PATCH] Update spoofing /tmp symlink instructions to be more specific about the name of the needed symlink file. --- doc/src/sgml/runtime.sgml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml index d487758020..ab688099c3 100644 --- a/doc/src/sgml/runtime.sgml +++ b/doc/src/sgml/runtime.sgml @@ -1,4 +1,4 @@ - + Operating System Environment @@ -1398,10 +1398,10 @@ $ kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`) that has write permission only for a trusted local user. This prevents a malicious user from creating their own socket file in that directory. If you are concerned that - some applications might still look in /tmp for the - socket file and hence be vulnerable to spoofing, create a symbolic link - during operating system startup in /tmp that points to - the relocated socket file. You also might need to modify your + some applications might still reference /tmp for the + socket file and hence be vulnerable to spoofing, during operating system + startup create symbolic link /tmp/.s.PGSQL.5432 that points + to the relocated socket file. You also might need to modify your /tmp cleanup script to preserve the symbolic link. -- 2.40.0