enabled at build time (see ).
+
+
Basic Setup
+
With
SSL support compiled in, the
PostgreSQL server can be started with
use of
SSL for some or all connections.
-
PostgreSQL reads the system-wide
-
OpenSSL configuration file. By default, this
- file is named openssl.cnf and is located in the
- directory reported by openssl version -d.
- This default can be overridden by setting environment variable
- OPENSSL_CONF to the name of the desired configuration file.
-
-
-
OpenSSL supports a wide range of ciphers
- and authentication algorithms, of varying strength. While a list of
- ciphers can be specified in the
OpenSSL
- configuration file, you can specify ciphers specifically for use by
- the database server by modifying in
- postgresql.conf.
-
-
-
- It is possible to have authentication without encryption overhead by
- using NULL-SHA or NULL-MD5 ciphers. However,
- a man-in-the-middle could read and pass communications between client
- and server. Also, encryption overhead is minimal compared to the
- overhead of authentication. For these reasons NULL ciphers are not
- recommended.
-
-
-
To start in
SSL mode, files containing the server certificate
and private key must exist. By default, these files are expected to be
server.crt. Instead, clients must have the root
certificate of the server's certificate chain.
+
+
+
+
OpenSSL Configuration
+
+
PostgreSQL reads the system-wide
+
OpenSSL configuration file. By default, this
+ file is named openssl.cnf and is located in the
+ directory reported by openssl version -d.
+ This default can be overridden by setting environment variable
+ OPENSSL_CONF to the name of the desired configuration file.
+
+
+
OpenSSL supports a wide range of ciphers
+ and authentication algorithms, of varying strength. While a list of
+ ciphers can be specified in the
OpenSSL
+ configuration file, you can specify ciphers specifically for use by
+ the database server by modifying in
+ postgresql.conf.
+
+
+
+ It is possible to have authentication without encryption overhead by
+ using NULL-SHA or NULL-MD5 ciphers. However,
+ a man-in-the-middle could read and pass communications between client
+ and server. Also, encryption overhead is minimal compared to the
+ overhead of authentication. For these reasons NULL ciphers are not
+ recommended.
+
+
+
Using Client Certificates