diff options
author | Peter Eisentraut <peter_e@gmx.net> | 2016-03-19 11:03:22 +0100 |
---|---|---|
committer | Peter Eisentraut <peter_e@gmx.net> | 2016-03-19 11:03:22 +0100 |
commit | 9a83564c58b7f6363141a8f1d0c87c89a5ebab5d (patch) | |
tree | d2384dd046c095d689fea1a8a395e1729bce8939 /doc/src | |
parent | 6eb2be15b5d24b98d334a9dd637f0edb37e2eb7e (diff) |
Allow SSL server key file to have group read access if owned by root
We used to require the server key file to have permissions 0600 or less
for best security. But some systems (such as Debian) have certificate
and key files managed by the operating system that can be shared with
other services. In those cases, the "postgres" user is made a member of
a special group that has access to those files, and the server key file
has permissions 0640. To accommodate that kind of setup, also allow the
key file to have permissions 0640 but only if owned by root.
From: Christoph Berg <myon@debian.org>
Reviewed-by: Alvaro Herrera <alvherre@alvh.no-ip.org>
Diffstat (limited to 'doc/src')
-rw-r--r-- | doc/src/sgml/runtime.sgml | 13 |
1 files changed, 12 insertions, 1 deletions
diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml index c699f2170b7..4a0e35a5eba 100644 --- a/doc/src/sgml/runtime.sgml +++ b/doc/src/sgml/runtime.sgml @@ -2147,9 +2147,20 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433 the server's data directory, but other names and locations can be specified using the configuration parameters <xref linkend="guc-ssl-cert-file"> and <xref linkend="guc-ssl-key-file">. + </para> + + <para> On Unix systems, the permissions on <filename>server.key</filename> must disallow any access to world or group; achieve this by the command - <command>chmod 0600 server.key</command>. + <command>chmod 0600 server.key</command>. Alternatively, the file can be + owned by root and have group read access (that is, <literal>0640</literal> + permissions). That setup is intended for installations where certificate + and key files are managed by the operating system. The user under which + the <productname>PostgreSQL</productname> server runs should then be made a + member of the group that has access to those certificate and key files. + </para> + + <para> If the private key is protected with a passphrase, the server will prompt for the passphrase and will not start until it has been entered. |