mirror of
https://github.com/postgres/postgres.git
synced 2025-05-15 00:02:24 -04:00
doc: Add more substructure to SSL documentation
The SSL documentation text has gotten a bit long, so add some subsections and reorder for better flow.
This commit is contained in:
parent
f9d34ce4e7
commit
d40c7cd004
@ -2158,6 +2158,9 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
|
|||||||
enabled at build time (see <xref linkend="installation"/>).
|
enabled at build time (see <xref linkend="installation"/>).
|
||||||
</para>
|
</para>
|
||||||
|
|
||||||
|
<sect2 id="ssl-setup">
|
||||||
|
<title>Basic Setup</title>
|
||||||
|
|
||||||
<para>
|
<para>
|
||||||
With <acronym>SSL</acronym> support compiled in, the
|
With <acronym>SSL</acronym> support compiled in, the
|
||||||
<productname>PostgreSQL</productname> server can be started with
|
<productname>PostgreSQL</productname> server can be started with
|
||||||
@ -2171,35 +2174,6 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
|
|||||||
use of <acronym>SSL</acronym> for some or all connections.
|
use of <acronym>SSL</acronym> for some or all connections.
|
||||||
</para>
|
</para>
|
||||||
|
|
||||||
<para>
|
|
||||||
<productname>PostgreSQL</productname> reads the system-wide
|
|
||||||
<productname>OpenSSL</productname> configuration file. By default, this
|
|
||||||
file is named <filename>openssl.cnf</filename> and is located in the
|
|
||||||
directory reported by <literal>openssl version -d</literal>.
|
|
||||||
This default can be overridden by setting environment variable
|
|
||||||
<envar>OPENSSL_CONF</envar> to the name of the desired configuration file.
|
|
||||||
</para>
|
|
||||||
|
|
||||||
<para>
|
|
||||||
<productname>OpenSSL</productname> supports a wide range of ciphers
|
|
||||||
and authentication algorithms, of varying strength. While a list of
|
|
||||||
ciphers can be specified in the <productname>OpenSSL</productname>
|
|
||||||
configuration file, you can specify ciphers specifically for use by
|
|
||||||
the database server by modifying <xref linkend="guc-ssl-ciphers"/> in
|
|
||||||
<filename>postgresql.conf</filename>.
|
|
||||||
</para>
|
|
||||||
|
|
||||||
<note>
|
|
||||||
<para>
|
|
||||||
It is possible to have authentication without encryption overhead by
|
|
||||||
using <literal>NULL-SHA</literal> or <literal>NULL-MD5</literal> ciphers. However,
|
|
||||||
a man-in-the-middle could read and pass communications between client
|
|
||||||
and server. Also, encryption overhead is minimal compared to the
|
|
||||||
overhead of authentication. For these reasons NULL ciphers are not
|
|
||||||
recommended.
|
|
||||||
</para>
|
|
||||||
</note>
|
|
||||||
|
|
||||||
<para>
|
<para>
|
||||||
To start in <acronym>SSL</acronym> mode, files containing the server certificate
|
To start in <acronym>SSL</acronym> mode, files containing the server certificate
|
||||||
and private key must exist. By default, these files are expected to be
|
and private key must exist. By default, these files are expected to be
|
||||||
@ -2245,6 +2219,40 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
|
|||||||
<filename>server.crt</filename>. Instead, clients must have the root
|
<filename>server.crt</filename>. Instead, clients must have the root
|
||||||
certificate of the server's certificate chain.
|
certificate of the server's certificate chain.
|
||||||
</para>
|
</para>
|
||||||
|
</sect2>
|
||||||
|
|
||||||
|
<sect2 id="ssl-openssl-config">
|
||||||
|
<title>OpenSSL Configuration</title>
|
||||||
|
|
||||||
|
<para>
|
||||||
|
<productname>PostgreSQL</productname> reads the system-wide
|
||||||
|
<productname>OpenSSL</productname> configuration file. By default, this
|
||||||
|
file is named <filename>openssl.cnf</filename> and is located in the
|
||||||
|
directory reported by <literal>openssl version -d</literal>.
|
||||||
|
This default can be overridden by setting environment variable
|
||||||
|
<envar>OPENSSL_CONF</envar> to the name of the desired configuration file.
|
||||||
|
</para>
|
||||||
|
|
||||||
|
<para>
|
||||||
|
<productname>OpenSSL</productname> supports a wide range of ciphers
|
||||||
|
and authentication algorithms, of varying strength. While a list of
|
||||||
|
ciphers can be specified in the <productname>OpenSSL</productname>
|
||||||
|
configuration file, you can specify ciphers specifically for use by
|
||||||
|
the database server by modifying <xref linkend="guc-ssl-ciphers"/> in
|
||||||
|
<filename>postgresql.conf</filename>.
|
||||||
|
</para>
|
||||||
|
|
||||||
|
<note>
|
||||||
|
<para>
|
||||||
|
It is possible to have authentication without encryption overhead by
|
||||||
|
using <literal>NULL-SHA</literal> or <literal>NULL-MD5</literal> ciphers. However,
|
||||||
|
a man-in-the-middle could read and pass communications between client
|
||||||
|
and server. Also, encryption overhead is minimal compared to the
|
||||||
|
overhead of authentication. For these reasons NULL ciphers are not
|
||||||
|
recommended.
|
||||||
|
</para>
|
||||||
|
</note>
|
||||||
|
</sect2>
|
||||||
|
|
||||||
<sect2 id="ssl-client-certificates">
|
<sect2 id="ssl-client-certificates">
|
||||||
<title>Using Client Certificates</title>
|
<title>Using Client Certificates</title>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user