From: | Daniel Farina <daniel(at)heroku(dot)com> |
---|---|
To: | Stephen Frost <sfrost(at)snowman(dot)net> |
Cc: | Charles(dot)McDevitt(at)emc(dot)com, alvherre(at)commandprompt(dot)com, greg(at)2ndquadrant(dot)com, mbanck(at)debian(dot)org, tgl(at)sss(dot)pgh(dot)pa(dot)us, andrew(at)dunslane(dot)net, jd(at)commandprompt(dot)com, pgsql-hackers(at)postgresql(dot)org |
Subject: | Re: Debian readline/libedit breakage |
Date: | 2011-02-11 21:02:34 |
Message-ID: | AANLkTik8BtWkrMehg=i25O_YyxO+izWMV1c0HHogskv0@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
On Fri, Feb 11, 2011 at 12:25 PM, Stephen Frost <sfrost(at)snowman(dot)net> wrote:
> * Charles(dot)McDevitt(at)emc(dot)com (Charles(dot)McDevitt(at)emc(dot)com) wrote:
>> Don't forget that OpenSSL has a FIPS-140 compliant version, and FIPS-140 compliance is essential to many Federal users.
>
> Essential? That's a bit much. Yes, it shows up on a FISMA review as an
> open action item, but it's a risk that can both be accepted and
> mitigated. I also thought FIPS-140 version required API changes..
>
>> GnuTLS doesn't qualify.
>
> That should be "doesn't currently"..
Not being a SSL aficionado by any means, but what about NSS? That's
pretty mature, and could be another viable option.
--
fdr
From | Date | Subject | |
---|---|---|---|
Next Message | Kevin Grittner | 2011-02-11 21:25:24 | Re: Range Types: empty ranges |
Previous Message | Alex Hunsaker | 2011-02-11 20:57:26 | Re: Careful PL/Perl Release Not Required |