ey cryptography to negotiate a
> > connection. (When I'm not busy, I may decide to do this myself)
>
> SSL?
I'd use the OpenSSL libraries to implement it, but we're talking about
public key authentication here, not connection encryption.
--
Michael Samuel <[EMA
sword on the server as does crypt and the double
crypt scheme)
* Public Key (RSA/DSA) - Use public key cryptography to negotiate a
connection. (When I'm not busy, I may decide to do this myself)
Also, I think we should add to the client API the ability to only accept
certain authentication schemes, to
with certificate verification* is the
correct fix. If no certificate verification is done, you fall victim to
a man-in-the-middle attack.
--
Michael Samuel <[EMAIL PROTECTED]>
---(end of broadcast)---
TIP 4: Don't 'kill -9' the postmaster
head within the function, but it's a
small price to pay for a robust implementation.
As for operator overloading, a decision must be made whether you search
for a more specific function first, or for a matching %TYPE.
Of course, this may be too many special cases to be coded cleanly...
--
Mi
ck if there's a
myfunc(int4), then failing that, check if there's a myfunc(foo.bar%TYPE).
Umm.. of course, there's no reason why it should search in that order,
because checking for myfunc(foo.bar%TYPE) first would be just as valid,
but either way, it's a well defined semantic
ed if I didn't get one, and
instead my incorrect query went through)
--
Michael Samuel <[EMAIL PROTECTED]>
---(end of broadcast)---
TIP 6: Have you searched our list archives?
http://www.postgresql.org/search.mpl
e permissions...
Ext2 would kick arse over FAT32 for performance.
--
Michael Samuel <[EMAIL PROTECTED]>
---(end of broadcast)---
TIP 4: Don't 'kill -9' the postmaster
o logging things like mtime or atime, because otherwise ReiserFS is a
very high performance FS. (Although, I admittedly haven't used it since it
was early in it's development)
--
Michael Samuel <[EMAIL PROTECTED]>
---(end of broadcast)--
handle this in the background,
as it's hardly important to the running of the database. (Or if it is, it
can become part of the transaction, which means that at rename() time, there
must be no room for other failures, but it mustn't be too late to roll back)
--
Michael Samuel <[EMAIL