| From: | Daniel Farina <daniel(at)heroku(dot)com> |
|---|---|
| To: | Stephen Frost <sfrost(at)snowman(dot)net> |
| Cc: | Charles(dot)McDevitt(at)emc(dot)com, alvherre(at)commandprompt(dot)com, greg(at)2ndquadrant(dot)com, mbanck(at)debian(dot)org, tgl(at)sss(dot)pgh(dot)pa(dot)us, andrew(at)dunslane(dot)net, jd(at)commandprompt(dot)com, pgsql-hackers(at)postgresql(dot)org |
| Subject: | Re: Debian readline/libedit breakage |
| Date: | 2011-02-11 21:02:34 |
| Message-ID: | AANLkTik8BtWkrMehg=i25O_YyxO+izWMV1c0HHogskv0@mail.gmail.com |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-hackers |
On Fri, Feb 11, 2011 at 12:25 PM, Stephen Frost <sfrost(at)snowman(dot)net> wrote:
> * Charles(dot)McDevitt(at)emc(dot)com (Charles(dot)McDevitt(at)emc(dot)com) wrote:
>> Don't forget that OpenSSL has a FIPS-140 compliant version, and FIPS-140 compliance is essential to many Federal users.
>
> Essential? That's a bit much. Yes, it shows up on a FISMA review as an
> open action item, but it's a risk that can both be accepted and
> mitigated. I also thought FIPS-140 version required API changes..
>
>> GnuTLS doesn't qualify.
>
> That should be "doesn't currently"..
Not being a SSL aficionado by any means, but what about NSS? That's
pretty mature, and could be another viable option.
--
fdr
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Kevin Grittner | 2011-02-11 21:25:24 | Re: Range Types: empty ranges |
| Previous Message | Alex Hunsaker | 2011-02-11 20:57:26 | Re: Careful PL/Perl Release Not Required |