From: Bruce Momjian Date: Tue, 12 Aug 2008 03:48:52 +0000 (+0000) Subject: Add: X-Git-Tag: REL8_4_BETA1~1096 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=fc152e95c154d5144660edae21cdac793f3e4cd6;p=postgresql Add: > * Add 'hostgss' pg_hba.conf option to allow GSS link-level encryption > > http://archives.postgresql.org/pgsql-hackers/2008-07/msg01454.php --- diff --git a/doc/TODO b/doc/TODO index 5b795383c6..258c3ba45f 100644 --- a/doc/TODO +++ b/doc/TODO @@ -1,7 +1,7 @@ PostgreSQL TODO List ==================== Current maintainer: Bruce Momjian (bruce@momjian.us) -Last updated: Thu Jul 31 16:47:21 EDT 2008 +Last updated: Mon Aug 11 23:48:39 EDT 2008 The most recent version of this document can be viewed at http://www.postgresql.org/docs/faqs.TODO.html. @@ -82,13 +82,17 @@ Administration http://archives.postgresql.org/pgsql-bugs/2007-12/msg00069.php -* Allow client certificate names to be checked against the client +* Allow SSL client certificate names to be checked against the client hostname This is already implemented in libpq/fe-secure.c::verify_peer_name_matches_certificate() but the code is commented out. +* Add 'hostgss' pg_hba.conf option to allow GSS link-level encryption + + http://archives.postgresql.org/pgsql-hackers/2008-07/msg01454.php + * Improve server security options http://archives.postgresql.org/pgsql-hackers/2008-04/msg01875.php diff --git a/doc/src/FAQ/TODO.html b/doc/src/FAQ/TODO.html index 008a5e6949..5d0f4a50a3 100644 --- a/doc/src/FAQ/TODO.html +++ b/doc/src/FAQ/TODO.html @@ -8,7 +8,7 @@

PostgreSQL TODO List

Current maintainer: Bruce Momjian (bruce@momjian.us)
-Last updated: Thu Jul 31 16:47:21 EDT 2008 +Last updated: Mon Aug 11 23:48:39 EDT 2008

The most recent version of this document can be viewed at
http://www.postgresql.org/docs/faqs.TODO.html. @@ -79,11 +79,14 @@ first. There is also a developer's wiki at
sharing SSL keys with other applications

http://archives.postgresql.org/pgsql-bugs/2007-12/msg00069.php

-
  • Allow client certificate names to be checked against the client +
  • Allow SSL client certificate names to be checked against the client hostname

    This is already implemented in libpq/fe-secure.c::verify_peer_name_matches_certificate() but the code is commented out. +

    +
  • Add 'hostgss' pg_hba.conf option to allow GSS link-level encryption +

    http://archives.postgresql.org/pgsql-hackers/2008-07/msg01454.php

  • Improve server security options

    http://archives.postgresql.org/pgsql-hackers/2008-04/msg01875.php