1
1
<!--
2
- $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.61 2003/11/29 19:51:36 pgsql Exp $
2
+ $PostgreSQL: pgsql/doc/src/sgml/client-auth.sgml,v 1.62 2003/12/13 23:59:06 neilc Exp $
3
3
-->
4
4
5
5
<chapter id="client-authentication">
@@ -111,10 +111,13 @@ hostnossl <replaceable>database</replaceable> <replaceable>user</replaceable>
111
111
<term><literal>host</literal></term>
112
112
<listitem>
113
113
<para>
114
- This record matches connection attempts using TCP/IP networks .
114
+ This record matches connection attempts made using TCP/IP.
115
115
Note that TCP/IP connections are disabled unless the server is
116
116
started with the <option>-i</option> option or the
117
- <varname>tcpip_socket</> configuration parameter is enabled.
117
+ <varname>tcpip_socket</> configuration parameter is
118
+ enabled. <literal>host</literal> records match either
119
+ <acronym>SSL</acronym> or non-<acronym>SSL</acronym> connection
120
+ attempts.
118
121
</para>
119
122
</listitem>
120
123
</varlistentry>
@@ -123,17 +126,17 @@ hostnossl <replaceable>database</replaceable> <replaceable>user</replaceable>
123
126
<term><literal>hostssl</literal></term>
124
127
<listitem>
125
128
<para>
126
- This record matches connection attempts using SSL over TCP/IP.
127
- <literal>host</literal> records will match either SSL or
128
- non-SSL connection attempts, but <literal>hostssl</literal>
129
- records require SSL connections.
129
+ This record matches connection attempts made using TCP/IP. In
130
+ addition, this record requires that the connection is made with
131
+ <acronym>SSL</acronym>.
130
132
</para>
131
133
132
134
<para>
133
- To make use of this option the server must be built
134
- with SSL support enabled. Furthermore, SSL must be enabled by
135
- enabling the <varname>ssl</varname> configuration parameter
136
- (see <xref linkend="runtime-config"> for more information).
135
+ To make use of this option the server must be built with
136
+ <acronym>SSL</acronym> support enabled. Furthermore,
137
+ <acronym>SSL</acronym> must be enabled by setting the
138
+ <varname>ssl</varname> configuration parameter (see <xref
139
+ linkend="ssl-tcp"> for more information).
137
140
</para>
138
141
</listitem>
139
142
</varlistentry>
@@ -143,8 +146,8 @@ hostnossl <replaceable>database</replaceable> <replaceable>user</replaceable>
143
146
<listitem>
144
147
<para>
145
148
This record is similar to <literal>hostssl</> but with the
146
- opposite logic: it matches only regular connection attempts not
147
- using SSL.
149
+ opposite logic: it only matches connection attempts made over
150
+ TCP/IP that do not use <acronym> SSL</acronym> .
148
151
</para>
149
152
</listitem>
150
153
</varlistentry>
@@ -593,7 +596,7 @@ local db1,db2,@demodbs all md5
593
596
<quote>sniffing</> attacks then <literal>md5</> is preferred, with
594
597
<literal>crypt</> a second choice if you must support pre-7.2
595
598
clients. Plain <literal>password</> should especially be avoided for
596
- connections over the open Internet (unless you use SSL, SSH, or
599
+ connections over the open Internet (unless you use <acronym> SSL</acronym> , SSH, or
597
600
other communications security wrappers around the connection).
598
601
</para>
599
602
0 commit comments