K2LL33D SHELL

 Apache/2.4.7 (Ubuntu)
 Linux sman1baleendah 3.13.0-24-generic #46-Ubuntu SMP Thu Apr 10 19:11:08 UTC 2014 x86_64
 uid=33(www-data) gid=33(www-data) groups=33(www-data)
 safemode : OFF
 MySQL: ON | Perl: ON | cURL: OFF | WGet: ON
  >  / usr / share / doc / dbconfig-common /
server ip : 104.21.89.46

your ip : 172.70.80.236

H O M E


Filename/usr/share/doc/dbconfig-common/README.pgsql
Size1.39 kb
Permissionrw-r--r--
Ownerroot : root
Create time27-Apr-2025 10:12
Last modified18-Feb-2009 05:05
Last accessed06-Jul-2025 18:38
Actionsedit | rename | delete | download (gzip)
Viewtext | code | image
helpful information for users who are using postgresql databases

AUTHENTICATION METHODS

postgres supports many types of authentication methods. dbconfig-common
currently classifies them into two families: "ident", and "password".
the former consists of local and remote postgresql "ident" type connections.
and the latter consists of all the postgresql connections that require
a password (password, crypt, md5, maybe pam/krb5).

for "ident" connections on a local host, the server will check that the
owner of the local unix socket is authorized to connect to the database.

for "ident' connections on a remote host, the server will use an rfc 1413
based ident connection to establish identification. this is probably a
bad idea, as ident is easily spoofable in non-secured networks.

for "password" connections, the psql client will send along passwords
with its connection attempts to the server. the server will then
pass the password to whatever authentication backends it's configured
to use. note that dbconfig-common has no control over whether or not
the password is sent cleartext over the network (see USING SSL), so
you should be aware of the security risks involved with network
based connections.

USING SSL

you must also configure your server to use SSL, which is beyond the
scope of this document. see:

http://developer.postgresql.org/docs/postgres/ssl-tcp.html

for directions on how to do that.