Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
P
Postgres FD Implementation
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Abuhujair Javed
Postgres FD Implementation
Commits
98dba620
Commit
98dba620
authored
Oct 20, 2000
by
Thomas G. Lockhart
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix ids and xrefs to avoid duplicates.
Remove copy/paste redundant extra section with slight merge of content.
parent
577fd41c
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
8 additions
and
62 deletions
+8
-62
doc/src/sgml/runtime.sgml
doc/src/sgml/runtime.sgml
+8
-62
No files found.
doc/src/sgml/runtime.sgml
View file @
98dba620
<!--
<!--
$Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.
29 2000/10/19 04:53:41 tgl
Exp $
$Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.
30 2000/10/20 14:00:49 thomas
Exp $
-->
-->
<Chapter Id="runtime">
<Chapter Id="runtime">
...
@@ -1014,7 +1014,7 @@ env PGOPTIONS='--geqo=off' psql
...
@@ -1014,7 +1014,7 @@ env PGOPTIONS='--geqo=off' psql
<listitem>
<listitem>
<para>
<para>
Enables <acronym>SSL</> connections. Please read
Enables <acronym>SSL</> connections. Please read
<xref linkend="ssl"> before using this. The default
<xref linkend="ssl
-tcp
"> before using this. The default
is off.
is off.
</para>
</para>
</listitem>
</listitem>
...
@@ -1637,7 +1637,7 @@ set semsys:seminfo_semmsl=32
...
@@ -1637,7 +1637,7 @@ set semsys:seminfo_semmsl=32
</para>
</para>
</sect1>
</sect1>
<sect1 id="ssl">
<sect1 id="ssl
-tcp
">
<title>Secure TCP/IP Connections with SSL</title>
<title>Secure TCP/IP Connections with SSL</title>
<para>
<para>
...
@@ -1654,7 +1654,8 @@ set semsys:seminfo_semmsl=32
...
@@ -1654,7 +1654,8 @@ set semsys:seminfo_semmsl=32
can be started with the argument <option>-l</> (ell) to enable
can be started with the argument <option>-l</> (ell) to enable
SSL connections. When starting in SSL mode, the postmaster will look
SSL connections. When starting in SSL mode, the postmaster will look
for the files <filename>server.key</> and <filename>server.crt</> in
for the files <filename>server.key</> and <filename>server.crt</> in
the data directory. These files should contain the server private key
the data directory (pointed to by <envar>PGDATA</envar>).
These files should contain the server private key
and certificate respectively. These files must be set up correctly
and certificate respectively. These files must be set up correctly
before an SSL-enabled server can start. If the private key is protected
before an SSL-enabled server can start. If the private key is protected
with a passphrase, the postmaster will prompt for the passphrase and will
with a passphrase, the postmaster will prompt for the passphrase and will
...
@@ -1664,7 +1665,8 @@ set semsys:seminfo_semmsl=32
...
@@ -1664,7 +1665,8 @@ set semsys:seminfo_semmsl=32
<para>
<para>
The postmaster will listen for both standard and SSL connections
The postmaster will listen for both standard and SSL connections
on the same TCP/IP port, and will negotiate with any connecting
on the same TCP/IP port, and will negotiate with any connecting
client wether to use SSL or not. See <xref linkend="client-authentication">
client whether or not to use SSL.
See <xref linkend="client-authentication">
about how to force on the server side the use of SSL for certain
about how to force on the server side the use of SSL for certain
connections.
connections.
</para>
</para>
...
@@ -1695,63 +1697,7 @@ openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.p
...
@@ -1695,63 +1697,7 @@ openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.p
</para>
</para>
</sect1>
</sect1>
<sect1 id="ssl">
<sect1 id="ssh-tunnels">
<title>Secure TCP/IP Connection with SSL</title>
<para>
PostgreSQL has native support for connections over SSL to encrypt
client/server communications for increased security. This requires
<productname>OpenSSL</productname> to be installed on both client
and server systems and support enabled at compile-time using
the configure script.
</para>
<para>
With SSL support compiled in, the Postgres backend can be
started with argument -l to enable SSL connections.
When starting in SSL mode, the postmaster will look for the
files <filename>server.key</filename> and
<filename>server.cert</filename> in the <envar>PGDATA</envar>
directory. These files should contain the server private key and
certificate respectively. If the private key is protected with a
passphrase, the postmaster will prompt for the passphrase and not
start until it has been provided.
</para>
<para>
The postmaster will listen for both standard and SSL connections
on the same TCP/IP port, and will negotiate with any connecting
client wether to use SSL or not. Use the <filename>pg_hba.conf</filename>
file to optionally require SSL in order to accept a connection.
</para>
<para>
For details on how to create your server private key and certificate,
refer to the OpenSSL documentation. A simple self-signed certificate
can be used to get started testing, but a certificate signed by a CA
(either one of the global CAs or a local one) should be used in
production so the client can verify the servers identity. To create
a quick self-signed certificate, use the <filename>CA.pl</filename>
script included in OpenSSL:
<programlisting>
CA.pl -newcert
</programlisting>
Fill out the information the script asks for. Make sure to enter
the local hostname as Common Name. The script will generate a key
which is passphrase protected. To remove the passphrase (required
if you want automatic startup of the postmaster), run the command
<programlisting>
openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.pem
</programlisting>
Enter the old passphrase to unlock the existing key. Copy the file
<filename>newreq.pem</filename> to <filename>PGDATA/server.cert</filename>
and <filename>newkey_no_passphrase.pem</filename> to
<filename>PGDATA/server.key</filename>. Remove the PRIVATE KEY part
from the <filename>server.cert</filename> using any text editor.
</para>
</sect1>
<sect1 id="ssh">
<title>Secure TCP/IP Connections with SSH tunnels</title>
<title>Secure TCP/IP Connections with SSH tunnels</title>
<note>
<note>
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment