On Thu, Nov 02, 2006 at 01:10:14PM -0800, Henry B. Hotz wrote:
> standard protocols and libraries that support real security:  SASL  
> and GSSAPI in particular.  You may for various reasons decide that  

[. . .]

> Part of establishing a secure connection is establishing that the end  
> points are the intended ones and there is no Man In the Middle.   
> Establishing the end points means the server has identified the user  
> within the name space of the security mechanism.

For what it's worth, I heartily support this effort.  For most cases,
it probably isn't necessary, but I can think of several applications
for SASL/GSSAPI where something weaker will simply not do; in the
absence of the proposed functionality, I simply wouldn't be able to
use Postgres for those applications.

A

-- 
Andrew Sullivan  | [EMAIL PROTECTED]
In the future this spectacle of the middle classes shocking the avant-
garde will probably become the textbook definition of Postmodernism. 
                --Brad Holland

---------------------------(end of broadcast)---------------------------
TIP 9: In versions below 8.0, the planner will ignore your desire to
       choose an index scan if your joining column's datatypes do not
       match

Reply via email to