On Thu, Nov 02, 2006 at 01:10:14PM -0800, Henry B. Hotz wrote: > standard protocols and libraries that support real security: SASL > and GSSAPI in particular. You may for various reasons decide that
[. . .] > Part of establishing a secure connection is establishing that the end > points are the intended ones and there is no Man In the Middle. > Establishing the end points means the server has identified the user > within the name space of the security mechanism. For what it's worth, I heartily support this effort. For most cases, it probably isn't necessary, but I can think of several applications for SASL/GSSAPI where something weaker will simply not do; in the absence of the proposed functionality, I simply wouldn't be able to use Postgres for those applications. A -- Andrew Sullivan | [EMAIL PROTECTED] In the future this spectacle of the middle classes shocking the avant- garde will probably become the textbook definition of Postmodernism. --Brad Holland ---------------------------(end of broadcast)--------------------------- TIP 9: In versions below 8.0, the planner will ignore your desire to choose an index scan if your joining column's datatypes do not match