diff options
author | Peter Eisentraut | 2018-02-03 16:29:23 +0000 |
---|---|---|
committer | Peter Eisentraut | 2018-02-04 21:51:22 +0000 |
commit | 20446a4a04240ce9880331eea3082c906ede4f26 (patch) | |
tree | cff5ab6c9915ed78a5fc8dccbfeb242dc89ba680 | |
parent | 1be67528e1088d8660acd13cb5eb6824a797ae08 (diff) |
doc: Update mentions of MD5 in the documentation
Reported-by: Shay Rojansky <roji@roji.org>
-rw-r--r-- | doc/src/sgml/runtime.sgml | 34 |
1 files changed, 9 insertions, 25 deletions
diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml index 6fa5d3910e0..9d9e83a6e53 100644 --- a/doc/src/sgml/runtime.sgml +++ b/doc/src/sgml/runtime.sgml @@ -2024,16 +2024,18 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433 <variablelist> <varlistentry> - <term>Password Storage Encryption</term> + <term>Password Encryption</term> <listitem> <para> - By default, database user passwords are stored as MD5 hashes, so - the administrator cannot determine the actual password assigned - to the user. If MD5 encryption is used for client authentication, - the unencrypted password is never even temporarily present on the - server because the client MD5-encrypts it before being sent - across the network. + Database user passwords are stored as hashes (determined by the setting + <xref linkend="guc-password-encryption">), so the administrator cannot + determine the actual password assigned to the user. If SCRAM or MD5 + encryption is used for client authentication, the unencrypted password is + never even temporarily present on the server because the client encrypts + it before being sent across the network. SCRAM is preferred, because it + is an Internet standard and is more secure than the PostgreSQL-specific + MD5 authentication protocol. </para> </listitem> </varlistentry> @@ -2088,24 +2090,6 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433 </varlistentry> <varlistentry> - <term>Encrypting Passwords Across A Network</term> - - <listitem> - <para> - The <literal>MD5</> authentication method double-encrypts the - password on the client before sending it to the server. It first - MD5-encrypts it based on the user name, and then encrypts it - based on a random salt sent by the server when the database - connection was made. It is this double-encrypted value that is - sent over the network to the server. Double-encryption not only - prevents the password from being discovered, it also prevents - another connection from using the same encrypted password to - connect to the database server at a later time. - </para> - </listitem> - </varlistentry> - - <varlistentry> <term>Encrypting Data Across A Network</term> <listitem> |