Commit 98dba620 authored by Thomas G. Lockhart's avatar Thomas G. Lockhart

Fix ids and xrefs to avoid duplicates.

Remove copy/paste redundant extra section with slight merge of content.
parent 577fd41c
<!-- <!--
$Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.29 2000/10/19 04:53:41 tgl Exp $ $Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.30 2000/10/20 14:00:49 thomas Exp $
--> -->
<Chapter Id="runtime"> <Chapter Id="runtime">
...@@ -1014,7 +1014,7 @@ env PGOPTIONS='--geqo=off' psql ...@@ -1014,7 +1014,7 @@ env PGOPTIONS='--geqo=off' psql
<listitem> <listitem>
<para> <para>
Enables <acronym>SSL</> connections. Please read Enables <acronym>SSL</> connections. Please read
<xref linkend="ssl"> before using this. The default <xref linkend="ssl-tcp"> before using this. The default
is off. is off.
</para> </para>
</listitem> </listitem>
...@@ -1637,7 +1637,7 @@ set semsys:seminfo_semmsl=32 ...@@ -1637,7 +1637,7 @@ set semsys:seminfo_semmsl=32
</para> </para>
</sect1> </sect1>
<sect1 id="ssl"> <sect1 id="ssl-tcp">
<title>Secure TCP/IP Connections with SSL</title> <title>Secure TCP/IP Connections with SSL</title>
<para> <para>
...@@ -1654,7 +1654,8 @@ set semsys:seminfo_semmsl=32 ...@@ -1654,7 +1654,8 @@ set semsys:seminfo_semmsl=32
can be started with the argument <option>-l</> (ell) to enable can be started with the argument <option>-l</> (ell) to enable
SSL connections. When starting in SSL mode, the postmaster will look SSL connections. When starting in SSL mode, the postmaster will look
for the files <filename>server.key</> and <filename>server.crt</> in for the files <filename>server.key</> and <filename>server.crt</> in
the data directory. These files should contain the server private key the data directory (pointed to by <envar>PGDATA</envar>).
These files should contain the server private key
and certificate respectively. These files must be set up correctly and certificate respectively. These files must be set up correctly
before an SSL-enabled server can start. If the private key is protected before an SSL-enabled server can start. If the private key is protected
with a passphrase, the postmaster will prompt for the passphrase and will with a passphrase, the postmaster will prompt for the passphrase and will
...@@ -1664,7 +1665,8 @@ set semsys:seminfo_semmsl=32 ...@@ -1664,7 +1665,8 @@ set semsys:seminfo_semmsl=32
<para> <para>
The postmaster will listen for both standard and SSL connections The postmaster will listen for both standard and SSL connections
on the same TCP/IP port, and will negotiate with any connecting on the same TCP/IP port, and will negotiate with any connecting
client wether to use SSL or not. See <xref linkend="client-authentication"> client whether or not to use SSL.
See <xref linkend="client-authentication">
about how to force on the server side the use of SSL for certain about how to force on the server side the use of SSL for certain
connections. connections.
</para> </para>
...@@ -1695,63 +1697,7 @@ openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.p ...@@ -1695,63 +1697,7 @@ openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.p
</para> </para>
</sect1> </sect1>
<sect1 id="ssl"> <sect1 id="ssh-tunnels">
<title>Secure TCP/IP Connection with SSL</title>
<para>
PostgreSQL has native support for connections over SSL to encrypt
client/server communications for increased security. This requires
<productname>OpenSSL</productname> to be installed on both client
and server systems and support enabled at compile-time using
the configure script.
</para>
<para>
With SSL support compiled in, the Postgres backend can be
started with argument -l to enable SSL connections.
When starting in SSL mode, the postmaster will look for the
files <filename>server.key</filename> and
<filename>server.cert</filename> in the <envar>PGDATA</envar>
directory. These files should contain the server private key and
certificate respectively. If the private key is protected with a
passphrase, the postmaster will prompt for the passphrase and not
start until it has been provided.
</para>
<para>
The postmaster will listen for both standard and SSL connections
on the same TCP/IP port, and will negotiate with any connecting
client wether to use SSL or not. Use the <filename>pg_hba.conf</filename>
file to optionally require SSL in order to accept a connection.
</para>
<para>
For details on how to create your server private key and certificate,
refer to the OpenSSL documentation. A simple self-signed certificate
can be used to get started testing, but a certificate signed by a CA
(either one of the global CAs or a local one) should be used in
production so the client can verify the servers identity. To create
a quick self-signed certificate, use the <filename>CA.pl</filename>
script included in OpenSSL:
<programlisting>
CA.pl -newcert
</programlisting>
Fill out the information the script asks for. Make sure to enter
the local hostname as Common Name. The script will generate a key
which is passphrase protected. To remove the passphrase (required
if you want automatic startup of the postmaster), run the command
<programlisting>
openssl x509 -inform PEM -outform PEM -in newreq.pem -out newkey_no_passphrase.pem
</programlisting>
Enter the old passphrase to unlock the existing key. Copy the file
<filename>newreq.pem</filename> to <filename>PGDATA/server.cert</filename>
and <filename>newkey_no_passphrase.pem</filename> to
<filename>PGDATA/server.key</filename>. Remove the PRIVATE KEY part
from the <filename>server.cert</filename> using any text editor.
</para>
</sect1>
<sect1 id="ssh">
<title>Secure TCP/IP Connections with SSH tunnels</title> <title>Secure TCP/IP Connections with SSH tunnels</title>
<note> <note>
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment