Andrew Sullivan ajs
Mon Jan 23 11:40:56 PST 2006
On Mon, Jan 23, 2006 at 07:10:40PM -0000, Roger Lucas wrote:
> Perhaps the slony processes around the system could be given the credentials
> for a restricted user and thus could not send administrative events (apart
> from SYNC).  When something goes wrong then the sysadmin can provide the
> credentials for a privileged user and make any required changes.  Upon
> completion, the sysadmin restores the credentials for the user with
> restricted privileges.

That was sort of what I had in mind for an acl approach.  Every node
gets its own user.  That way, you just have a list of things that can
originate from any given user.  Now, you want your slonik commands to
come from a particular workstation, and always be injected at one
(and only one) node?  Then you configure the ACL on every node except
the injection site to refuse such commands, and you configure the
nodes to accept such commands coming only from this or that node.

This has several problems I can think of.  You'll need to be
perfectly certain of your listen paths.  I can think  of all sorts of
ways this might break.  I also don't think it'd be a trivial amount
of work to hack in (and an even less-trivial job to make it anything
other than easy to circumvent).  But on the back of a napkin it looks
implementable.  I'd be interested to see a real proposal.

A

-- 
Andrew Sullivan  | ajs at crankycanuck.ca
Information security isn't a technological problem.  It's an economics
problem.
		--Bruce Schneier



More information about the Slony1-general mailing list