@@ -662,7 +662,7 @@ include_dir <replaceable>directory</replaceable>
662662 entire <literal>Distinguished Name (DN)</literal> of the certificate.
663663 This option is probably best used in conjunction with a username map.
664664 The comparison is done with the <literal>DN</literal> in
665- <ulink url="https://tools .ietf.org/html/rfc2253">RFC 2253</ulink>
665+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2253">RFC 2253</ulink>
666666 format. To see the <literal>DN</literal> of a client certificate
667667 in this format, do
668668<programlisting>
@@ -1089,7 +1089,7 @@ omicron bryanh guest1
10891089 <para>
10901090 <link linkend="auth-ident">Ident authentication</link>, which
10911091 relies on an <quote>Identification Protocol</quote>
1092- (<ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>)
1092+ (<ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>)
10931093 service on the client's machine. (On local Unix-socket connections,
10941094 this is treated as peer authentication.)
10951095 </para>
@@ -1228,7 +1228,7 @@ omicron bryanh guest1
12281228 <para>
12291229 The method <literal>scram-sha-256</literal> performs SCRAM-SHA-256
12301230 authentication, as described in
1231- <ulink url="https://tools .ietf.org/html/rfc7677">RFC 7677</ulink>. It
1231+ <ulink url="https://datatracker .ietf.org/doc /html/rfc7677">RFC 7677</ulink>. It
12321232 is a challenge-response scheme that prevents password sniffing on
12331233 untrusted connections and supports storing passwords on the server in a
12341234 cryptographically hashed form that is thought to be secure.
@@ -1340,7 +1340,7 @@ omicron bryanh guest1
13401340 <para>
13411341 <productname>GSSAPI</productname> is an industry-standard protocol
13421342 for secure authentication defined in
1343- <ulink url="https://tools .ietf.org/html/rfc2743">RFC 2743</ulink>.
1343+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2743">RFC 2743</ulink>.
13441344 <productname>PostgreSQL</productname>
13451345 supports <productname>GSSAPI</productname> for authentication,
13461346 communications encryption, or both.
@@ -1655,7 +1655,7 @@ omicron bryanh guest1
16551655
16561656 <para>
16571657 The <quote>Identification Protocol</quote> is described in
1658- <ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>.
1658+ <ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>.
16591659 Virtually every Unix-like
16601660 operating system ships with an ident server that listens on TCP
16611661 port 113 by default. The basic functionality of an ident server
@@ -1824,7 +1824,7 @@ omicron bryanh guest1
18241824 <para>
18251825 Set to 1 to make the connection between PostgreSQL and the LDAP server
18261826 use TLS encryption. This uses the <literal>StartTLS</literal>
1827- operation per <ulink url="https://tools .ietf.org/html/rfc4513">RFC 4513</ulink>.
1827+ operation per <ulink url="https://datatracker .ietf.org/doc /html/rfc4513">RFC 4513</ulink>.
18281828 See also the <literal>ldapscheme</literal> option for an alternative.
18291829 </para>
18301830 </listitem>
@@ -1919,7 +1919,7 @@ omicron bryanh guest1
19191919 <term><literal>ldapurl</literal></term>
19201920 <listitem>
19211921 <para>
1922- An <ulink url="https://tools .ietf.org/html/rfc4516">RFC 4516</ulink>
1922+ An <ulink url="https://datatracker .ietf.org/doc /html/rfc4516">RFC 4516</ulink>
19231923 LDAP URL. This is an alternative way to write some of the
19241924 other LDAP options in a more compact and standard form. The format is
19251925<synopsis>
@@ -1982,7 +1982,7 @@ ldap[s]://<replaceable>host</replaceable>[:<replaceable>port</replaceable>]/<rep
19821982 <productname>OpenLDAP</productname> as the LDAP client library, the
19831983 <literal>ldapserver</literal> setting may be omitted. In that case, a
19841984 list of host names and ports is looked up via
1985- <ulink url="https://tools .ietf.org/html/rfc2782">RFC 2782</ulink> DNS SRV records.
1985+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2782">RFC 2782</ulink> DNS SRV records.
19861986 The name <literal>_ldap._tcp.DOMAIN</literal> is looked up, where
19871987 <literal>DOMAIN</literal> is extracted from <literal>ldapbasedn</literal>.
19881988 </para>