Dickson S. Guedes wrote: > SSH uses an approach like that. It would probably be a good idea to check how other programs deal with hostname lookups during authentication. Programs like SSH, Apache, and Squid come to mind.
pgsql-hackers by date:
Соглашаюсь с условиями обработки персональных данных