On 8/16/2016 1:32 PM, support-tiger wrote:
   local    all             all                     trust

so all unix 'domain' connections will allow any process on the system to authenticate as any SQL user. I nearly always use peer here. my applications which want to connect as a different db user than their os user, I specify host=localhost so it uses below instead...

   host     all             all       127.0.0.1/32  trust

anyone coming in via ipv4 localhost can also authenticate as any SQL user. I always use md5 here, so apps connecting with host=localhost can specify a sql user, with a password.

   host     all             all       ::1/128       ident

anyone coming in as ipv6 localhost will require authd/identd protocol to identify them... ugh, hardly noone runs authd anymore, its considered bad security practice. its also inconsistent with ipv4 localhost above, so if you -h localhost, you're not sure what you're getting... I would always use md5 here.



--
john r pierce, recycling bits in santa cruz



--
Sent via pgsql-general mailing list (pgsql-general@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-general

Reply via email to