|
1 | | -<!-- $Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.16 2001/08/15 18:42:14 momjian Exp $ --> |
| 1 | +<!-- $Header: /cvsroot/pgsql/doc/src/sgml/client-auth.sgml,v 1.17 2001/08/16 16:24:15 momjian Exp $ --> |
2 | 2 |
|
3 | 3 | <chapter id="client-authentication"> |
4 | 4 | <title>Client Authentication</title> |
@@ -194,25 +194,36 @@ hostssl <replaceable>database</replaceable> <replaceable>IP-address</replaceable |
194 | 194 |
|
195 | 195 | <para> |
196 | 196 | The password is sent over the wire in clear text. For better |
197 | | - protection, use the <literal>crypt</literal> method. |
| 197 | + protection, use the <literal>md5</literal> or |
| 198 | + <literal>crypt</literal> methods. |
198 | 199 | </para> |
199 | 200 | </listitem> |
200 | 201 | </varlistentry> |
201 | 202 |
|
202 | 203 | <varlistentry> |
203 | | - <term>crypt</> |
| 204 | + <term>md5</> |
204 | 205 | <listitem> |
205 | 206 | <para> |
206 | 207 | Like the <literal>password</literal> method, but the password |
207 | 208 | is sent over the wire encrypted using a simple |
208 | 209 | challenge-response protocol. This protects against incidental |
209 | 210 | wire-sniffing. The name of a file may follow the |
210 | | - <literal>crypt</literal> keyword. It contains a list of users |
| 211 | + <literal>md5</literal> keyword. It contains a list of users |
211 | 212 | for this record. |
212 | 213 | </para> |
213 | 214 | </listitem> |
214 | 215 | </varlistentry> |
215 | 216 |
|
| 217 | + <varlistentry> |
| 218 | + <term>crypt</> |
| 219 | + <listitem> |
| 220 | + <para> |
| 221 | + Like the <literal>md5</literal> method but uses older crypt |
| 222 | + authentication for pre-7.2 clients. |
| 223 | + </para> |
| 224 | + </listitem> |
| 225 | + </varlistentry> |
| 226 | + |
216 | 227 | <varlistentry> |
217 | 228 | <term>krb4</> |
218 | 229 | <listitem> |
@@ -328,7 +339,7 @@ host template1 192.168.93.0 255.255.255.0 ident sameuser |
328 | 339 | # Allow a user from host 192.168.12.10 to connect to database "template1" |
329 | 340 | # if the user's password in pg_shadow is correctly supplied: |
330 | 341 |
|
331 | | -host template1 192.168.12.10 255.255.255.255crypt |
| 342 | +host template1 192.168.12.10 255.255.255.255md5 |
332 | 343 |
|
333 | 344 | # In the absence of preceding "host" lines, these two lines will reject |
334 | 345 | # all connection attempts from 192.168.54.1 (since that entry will be |
@@ -377,11 +388,11 @@ host all 192.168.0.0 255.255.0.0 ident omicron |
377 | 388 | </para> |
378 | 389 |
|
379 | 390 | <para> |
380 | | - To restrict the set of users that are allowed to connect to |
381 | | -certaindatabases, list the set of users in a separate file (one |
382 | | -user nameper line) in the same directory that |
383 | | -<filename>pg_hba.conf</> is in,and mention the (base) name of the |
384 | | -file after the<literal>password</> or <literal>crypt</> keyword, |
| 391 | + To restrict the set of users that are allowed to connect to certain |
| 392 | + databases, list the set of users in a separate file (one user name |
| 393 | + per line) in the same directory that <filename>pg_hba.conf</> is in, |
| 394 | + and mention the (base) name of the file after the |
| 395 | + <literal>password</>, <literal>md5</>, or <literal>crypt</> keyword, |
385 | 396 | respectively, in <filename>pg_hba.conf</>. If you do not use this |
386 | 397 | feature, then any user that is known to the database system can |
387 | 398 | connect to any database (so long as he passes password |
@@ -414,8 +425,8 @@ host all 192.168.0.0 255.255.0.0 ident omicron |
414 | 425 | </para> |
415 | 426 |
|
416 | 427 | <para> |
417 | | - Alternative passwords cannot be used when using the |
418 | | - <literal>crypt</>method. The file will still be evaluated as |
| 428 | + Alternative passwords cannot be used when using the <literal>md5</> |
| 429 | +or<literal>crypt</>methods. The file will still be evaluated as |
419 | 430 | usual but the password field will simply be ignored and the |
420 | 431 | <literal>pg_shadow</> password will be used. |
421 | 432 | </para> |
|