@@ -627,7 +627,7 @@ hostnogssenc <replaceable>database</replaceable> <replaceable>user</replaceabl
627627 entire <literal>Distinguished Name (DN)</literal> of the certificate.
628628 This option is probably best used in conjunction with a username map.
629629 The comparison is done with the <literal>DN</literal> in
630- <ulink url="https://tools .ietf.org/html/rfc2253">RFC 2253</ulink>
630+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2253">RFC 2253</ulink>
631631 format. To see the <literal>DN</literal> of a client certificate
632632 in this format, do
633633<programlisting>
@@ -967,7 +967,7 @@ omicron bryanh guest1
967967 <para>
968968 <link linkend="auth-ident">Ident authentication</link>, which
969969 relies on an <quote>Identification Protocol</quote>
970- (<ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>)
970+ (<ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>)
971971 service on the client's machine. (On local Unix-socket connections,
972972 this is treated as peer authentication.)
973973 </para>
@@ -1106,7 +1106,7 @@ omicron bryanh guest1
11061106 <para>
11071107 The method <literal>scram-sha-256</literal> performs SCRAM-SHA-256
11081108 authentication, as described in
1109- <ulink url="https://tools .ietf.org/html/rfc7677">RFC 7677</ulink>. It
1109+ <ulink url="https://datatracker .ietf.org/doc /html/rfc7677">RFC 7677</ulink>. It
11101110 is a challenge-response scheme that prevents password sniffing on
11111111 untrusted connections and supports storing passwords on the server in a
11121112 cryptographically hashed form that is thought to be secure.
@@ -1218,7 +1218,7 @@ omicron bryanh guest1
12181218 <para>
12191219 <productname>GSSAPI</productname> is an industry-standard protocol
12201220 for secure authentication defined in
1221- <ulink url="https://tools .ietf.org/html/rfc2743">RFC 2743</ulink>.
1221+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2743">RFC 2743</ulink>.
12221222 <productname>PostgreSQL</productname>
12231223 supports <productname>GSSAPI</productname> for authentication,
12241224 communications encryption, or both.
@@ -1533,7 +1533,7 @@ omicron bryanh guest1
15331533
15341534 <para>
15351535 The <quote>Identification Protocol</quote> is described in
1536- <ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>.
1536+ <ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>.
15371537 Virtually every Unix-like
15381538 operating system ships with an ident server that listens on TCP
15391539 port 113 by default. The basic functionality of an ident server
@@ -1702,7 +1702,7 @@ omicron bryanh guest1
17021702 <para>
17031703 Set to 1 to make the connection between PostgreSQL and the LDAP server
17041704 use TLS encryption. This uses the <literal>StartTLS</literal>
1705- operation per <ulink url="https://tools .ietf.org/html/rfc4513">RFC 4513</ulink>.
1705+ operation per <ulink url="https://datatracker .ietf.org/doc /html/rfc4513">RFC 4513</ulink>.
17061706 See also the <literal>ldapscheme</literal> option for an alternative.
17071707 </para>
17081708 </listitem>
@@ -1797,7 +1797,7 @@ omicron bryanh guest1
17971797 <term><literal>ldapurl</literal></term>
17981798 <listitem>
17991799 <para>
1800- An <ulink url="https://tools .ietf.org/html/rfc4516">RFC 4516</ulink>
1800+ An <ulink url="https://datatracker .ietf.org/doc /html/rfc4516">RFC 4516</ulink>
18011801 LDAP URL. This is an alternative way to write some of the
18021802 other LDAP options in a more compact and standard form. The format is
18031803<synopsis>
@@ -1860,7 +1860,7 @@ ldap[s]://<replaceable>host</replaceable>[:<replaceable>port</replaceable>]/<rep
18601860 <productname>OpenLDAP</productname> as the LDAP client library, the
18611861 <literal>ldapserver</literal> setting may be omitted. In that case, a
18621862 list of host names and ports is looked up via
1863- <ulink url="https://tools .ietf.org/html/rfc2782">RFC 2782</ulink> DNS SRV records.
1863+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2782">RFC 2782</ulink> DNS SRV records.
18641864 The name <literal>_ldap._tcp.DOMAIN</literal> is looked up, where
18651865 <literal>DOMAIN</literal> is extracted from <literal>ldapbasedn</literal>.
18661866 </para>