Re: Security lessons from liblzma
От | Robert Haas |
---|---|
Тема | Re: Security lessons from liblzma |
Дата | |
Msg-id | CA+TgmoYjxWVDUhYE+6MXs9V3NTqH50+wAs50E3goAr4VaTdtbA@mail.gmail.com обсуждение исходный текст |
Ответ на | Re: Security lessons from liblzma (Daniel Gustafsson <daniel@yesql.se>) |
Ответы |
Re: Security lessons from liblzma
|
Список | pgsql-hackers |
On Thu, Apr 4, 2024 at 4:48 PM Daniel Gustafsson <daniel@yesql.se> wrote: > AFAIK we haven't historically enforced that installations have the openssl > binary in PATH, but it would be a pretty low bar to add. The bigger issue is > likely to find someone to port this to Windows, it probably won't be too hard > but as with all things building on Windows, we need someone skilled in that > area to do it. I wonder how hard it would be to just code up our own binary to do this. If it'd be a pain to do that, or to maintain it across SSL versions, then it's a bad plan and we shouldn't do it. But if it's not that much code, maybe it'd be worth considering. I'm also sort of afraid that we're getting sucked into thinking real hard about this SSL certificate issue rather than trying to brainstorm all the other places that might be problematic. The latter might be a more fruitful exercise (or maybe not, what do I know?). -- Robert Haas EDB: http://www.enterprisedb.com
В списке pgsql-hackers по дате отправления: