@@ -2158,6 +2158,9 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
2158
2158
enabled at build time (see <xref linkend="installation"/>).
2159
2159
</para>
2160
2160
2161
+ <sect2 id="ssl-setup">
2162
+ <title>Basic Setup</title>
2163
+
2161
2164
<para>
2162
2165
With <acronym>SSL</acronym> support compiled in, the
2163
2166
<productname>PostgreSQL</productname> server can be started with
@@ -2171,35 +2174,6 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
2171
2174
use of <acronym>SSL</acronym> for some or all connections.
2172
2175
</para>
2173
2176
2174
- <para>
2175
- <productname>PostgreSQL</productname> reads the system-wide
2176
- <productname>OpenSSL</productname> configuration file. By default, this
2177
- file is named <filename>openssl.cnf</filename> and is located in the
2178
- directory reported by <literal>openssl version -d</literal>.
2179
- This default can be overridden by setting environment variable
2180
- <envar>OPENSSL_CONF</envar> to the name of the desired configuration file.
2181
- </para>
2182
-
2183
- <para>
2184
- <productname>OpenSSL</productname> supports a wide range of ciphers
2185
- and authentication algorithms, of varying strength. While a list of
2186
- ciphers can be specified in the <productname>OpenSSL</productname>
2187
- configuration file, you can specify ciphers specifically for use by
2188
- the database server by modifying <xref linkend="guc-ssl-ciphers"/> in
2189
- <filename>postgresql.conf</filename>.
2190
- </para>
2191
-
2192
- <note>
2193
- <para>
2194
- It is possible to have authentication without encryption overhead by
2195
- using <literal>NULL-SHA</literal> or <literal>NULL-MD5</literal> ciphers. However,
2196
- a man-in-the-middle could read and pass communications between client
2197
- and server. Also, encryption overhead is minimal compared to the
2198
- overhead of authentication. For these reasons NULL ciphers are not
2199
- recommended.
2200
- </para>
2201
- </note>
2202
-
2203
2177
<para>
2204
2178
To start in <acronym>SSL</acronym> mode, files containing the server certificate
2205
2179
and private key must exist. By default, these files are expected to be
@@ -2245,6 +2219,40 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
2245
2219
<filename>server.crt</filename>. Instead, clients must have the root
2246
2220
certificate of the server's certificate chain.
2247
2221
</para>
2222
+ </sect2>
2223
+
2224
+ <sect2 id="ssl-openssl-config">
2225
+ <title>OpenSSL Configuration</title>
2226
+
2227
+ <para>
2228
+ <productname>PostgreSQL</productname> reads the system-wide
2229
+ <productname>OpenSSL</productname> configuration file. By default, this
2230
+ file is named <filename>openssl.cnf</filename> and is located in the
2231
+ directory reported by <literal>openssl version -d</literal>.
2232
+ This default can be overridden by setting environment variable
2233
+ <envar>OPENSSL_CONF</envar> to the name of the desired configuration file.
2234
+ </para>
2235
+
2236
+ <para>
2237
+ <productname>OpenSSL</productname> supports a wide range of ciphers
2238
+ and authentication algorithms, of varying strength. While a list of
2239
+ ciphers can be specified in the <productname>OpenSSL</productname>
2240
+ configuration file, you can specify ciphers specifically for use by
2241
+ the database server by modifying <xref linkend="guc-ssl-ciphers"/> in
2242
+ <filename>postgresql.conf</filename>.
2243
+ </para>
2244
+
2245
+ <note>
2246
+ <para>
2247
+ It is possible to have authentication without encryption overhead by
2248
+ using <literal>NULL-SHA</literal> or <literal>NULL-MD5</literal> ciphers. However,
2249
+ a man-in-the-middle could read and pass communications between client
2250
+ and server. Also, encryption overhead is minimal compared to the
2251
+ overhead of authentication. For these reasons NULL ciphers are not
2252
+ recommended.
2253
+ </para>
2254
+ </note>
2255
+ </sect2>
2248
2256
2249
2257
<sect2 id="ssl-client-certificates">
2250
2258
<title>Using Client Certificates</title>
0 commit comments