From: | Bruce Momjian <bruce(at)momjian(dot)us> |
---|---|
To: | Magnus Hagander <magnus(at)hagander(dot)net> |
Cc: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, Christoph Berg <cb(at)df7cb(dot)de>, Chris Butler <cbutler(at)zedcore(dot)com>, "pgsql-pkg-debian(at)postgresql(dot)org" <pgsql-pkg-debian(at)postgresql(dot)org>, PostgreSQL Hackers <pgsql-hackers(at)postgresql(dot)org> |
Subject: | Re: Re: [pgsql-pkg-debian] Updated libpq5 packages cause connection errors on postgresql 9.2 |
Date: | 2015-04-01 16:09:07 |
Message-ID: | 20150401160907.GJ4466@momjian.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers pgsql-pkg-debian |
On Sat, Dec 20, 2014 at 12:27:05PM +0100, Magnus Hagander wrote:
> I haven't seen a specific number, it might depend on exactly which cipher is
> negotiated. See for example http://openssl.6102.n7.nabble.com/
> What-is-the-reason-for-error-quot-SSL-negotiation-failed-error-04075070-rsa-routines-RSA-sign-digest-td43953.html
>
> All references I have foud say at least 2014 is safe and 512 is broken, but
> there are points in betwee nthat apparently works in some cases only.
>
> I think if we say "use 1024 bits or more" we err on the safe side.
Did we ever decide on this?
--
Bruce Momjian <bruce(at)momjian(dot)us> http://momjian.us
EnterpriseDB http://enterprisedb.com
+ Everyone has their own god. +
From | Date | Subject | |
---|---|---|---|
Next Message | Bruce Momjian | 2015-04-01 16:12:57 | Re: Bogus WAL segments archived after promotion |
Previous Message | Andres Freund | 2015-04-01 16:04:40 | Re: Tables cannot have INSTEAD OF triggers |
From | Date | Subject | |
---|---|---|---|
Next Message | Christoph Berg | 2015-04-01 20:11:52 | Re: Re: [pgsql-pkg-debian] Updated libpq5 packages cause connection errors on postgresql 9.2 |
Previous Message | apt.postgresql.org repository | 2015-04-01 13:20:06 | postgis updated to version 2.1.7+dfsg-0~exp1.pgdg+1 |