summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPeter Eisentraut2018-02-03 16:29:23 +0000
committerPeter Eisentraut2018-02-04 21:51:22 +0000
commit20446a4a04240ce9880331eea3082c906ede4f26 (patch)
treecff5ab6c9915ed78a5fc8dccbfeb242dc89ba680
parent1be67528e1088d8660acd13cb5eb6824a797ae08 (diff)
doc: Update mentions of MD5 in the documentation
Reported-by: Shay Rojansky <roji@roji.org>
-rw-r--r--doc/src/sgml/runtime.sgml34
1 files changed, 9 insertions, 25 deletions
diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml
index 6fa5d3910e0..9d9e83a6e53 100644
--- a/doc/src/sgml/runtime.sgml
+++ b/doc/src/sgml/runtime.sgml
@@ -2024,16 +2024,18 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
<variablelist>
<varlistentry>
- <term>Password Storage Encryption</term>
+ <term>Password Encryption</term>
<listitem>
<para>
- By default, database user passwords are stored as MD5 hashes, so
- the administrator cannot determine the actual password assigned
- to the user. If MD5 encryption is used for client authentication,
- the unencrypted password is never even temporarily present on the
- server because the client MD5-encrypts it before being sent
- across the network.
+ Database user passwords are stored as hashes (determined by the setting
+ <xref linkend="guc-password-encryption">), so the administrator cannot
+ determine the actual password assigned to the user. If SCRAM or MD5
+ encryption is used for client authentication, the unencrypted password is
+ never even temporarily present on the server because the client encrypts
+ it before being sent across the network. SCRAM is preferred, because it
+ is an Internet standard and is more secure than the PostgreSQL-specific
+ MD5 authentication protocol.
</para>
</listitem>
</varlistentry>
@@ -2088,24 +2090,6 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
</varlistentry>
<varlistentry>
- <term>Encrypting Passwords Across A Network</term>
-
- <listitem>
- <para>
- The <literal>MD5</> authentication method double-encrypts the
- password on the client before sending it to the server. It first
- MD5-encrypts it based on the user name, and then encrypts it
- based on a random salt sent by the server when the database
- connection was made. It is this double-encrypted value that is
- sent over the network to the server. Double-encryption not only
- prevents the password from being discovered, it also prevents
- another connection from using the same encrypted password to
- connect to the database server at a later time.
- </para>
- </listitem>
- </varlistentry>
-
- <varlistentry>
<term>Encrypting Data Across A Network</term>
<listitem>