@ -2602,18 +2602,16 @@ openssl x509 -req -in server.csr -text -days 365 \
<para>
<productname>PostgreSQL</productname> can be configured for Server Name
Indication, <acronym>SNI</acronym>, using the <filename>pg_hosts.conf</filename >
configuration file . <productname>PostgreSQL</productname> inspects the TLS
hostname extension in the SSL connection handshake, and selects the right
TLS certificate, key and CA certificate to use for the connection based on
entries in the configuration file <filename>pg_hosts.conf</filename> .
Indication, <acronym>SNI</acronym>, using the <xref linkend="guc-ssl-sni"/ >
configuration parameter . <productname>PostgreSQL</productname> inspects the
TLS hostname extension in the SSL connection handshake, and selects the
right certificate, key and CA certificate to use for the connection based
on entries in the <xref linkend="guc-hosts-file"/> configuration file .
</para>
<para>
SNI configuration is defined in the hosts configuration file,
<filename>pg_hosts.conf</filename>, which is stored in the cluster's
data directory. The hosts configuration file contains lines of these
general forms:
The <xref linkend="guc-hosts-file"/> configuration file contains lines of
these general forms:
<synopsis>
<replaceable>hostname</replaceable> <replaceable>SSL_certificate</replaceable> <replaceable>SSL_key</replaceable> <optional> <replaceable>SSL_CA_certificate</replaceable> <optional> <replaceable>SSL_passphrase_cmd</replaceable> <optional> <replaceable>SSL_passphrase_cmd_reload</replaceable> </optional> </optional> </optional>
<literal>include</literal> <replaceable>file</replaceable>
@ -2622,8 +2620,9 @@ openssl x509 -req -in server.csr -text -days 365 \
</synopsis>
Comments, whitespace, line continuations, and inclusion directives are
handled in the same way as
in <filename>pg_hba.conf</filename>. <replaceable>hostname</replaceable>
is matched against the hostname TLS extension in the SSL handshake.
in <xref linkend="guc-hba-file"/>. <replaceable>hostname</replaceable>
is matched case-insensitively against the <literal>hostname</literal> TLS
extension in the SSL handshake.
<replaceable>SSL_certificate</replaceable>,
<replaceable>SSL_key</replaceable>,
<replaceable>SSL_CA_certificate</replaceable>,
@ -2655,7 +2654,7 @@ openssl x509 -req -in server.csr -text -days 365 \
<thead>
<row>
<entry>Host Entry</entry>
<entry>sslsni </entry>
<entry>Hostname extension </entry>
<entry>Description</entry>
</row>
</thead>
@ -2695,9 +2694,9 @@ openssl x509 -req -in server.csr -text -days 365 \
</para>
<para>
If <filename>pg_hosts.conf</filename > is empty or missing, then the SSL
If <xref linkend="guc-hosts-file"/ > is empty or missing, then the SSL
configuration in <filename>postgresql.conf</filename> will be used for all
connections. If <filename>pg_hosts.conf</filename > is non-empty then it
connections. If <xref linkend="guc-hosts-file"/ > is non-empty then it
will take precedence over certificate and key settings in
<filename>postgresql.conf</filename>.
</para>
@ -2705,7 +2704,7 @@ openssl x509 -req -in server.csr -text -days 365 \
<para>
It is currently not possible to set different <literal>clientname</literal>
values for the different certificates. Any <literal>clientname</literal>
setting in <filename>pg_hba.conf</filename > will be applied during
setting in <xref linkend="guc-hba-file"/ > will be applied during
authentication regardless of which set of certificates have been loaded
via an SNI enabled connection.
</para>