PostgreSQL
19.3.1. Connection Settings
- [.term]#
listen_addresses
(string
) -
Specifies the TCP/IP address(es) on which the server is to listen for connections from client applications. The value takes the form of a comma-separated list of host names and/or numeric IP addresses. The special entry
*
corresponds to all available IP interfaces. The entry0.0.0.0
allows listening for all IPv4 addresses and::
allows listening for all IPv6 addresses. If the list is empty, the server does not listen on any IP interface at all, in which case only Unix-domain sockets can be used to connect to it. The default value is localhost, which allows only local TCP/IP “[.quote]#loopback”# connections to be made. While client authentication (Chapter 20) allows fine-grained control over who can access the server,listen_addresses
controls which interfaces accept connection attempts, which can help prevent repeated malicious connection requests on insecure network interfaces. This parameter can only be set at server start. - [.term]#
port
(integer
) -
The TCP port the server listens on; 5432 by default. Note that the same port number is used for all IP addresses the server listens on. This parameter can only be set at server start.
- [.term]#
max_connections
(integer
) -
Determines the maximum number of concurrent connections to the database server. The default is typically 100 connections, but might be less if your kernel settings will not support it (as determined during initdb). This parameter can only be set at server start. + When running a standby server, you must set this parameter to the same or higher value than on the master server. Otherwise, queries will not be allowed in the standby server.
- [.term]#
superuser_reserved_connections
(integer
) -
Determines the number of connection “[.quote]#slots”# that are reserved for connections by PostgreSQL superusers. At most max_connections connections can ever be active simultaneously. Whenever the number of active concurrent connections is at least
max_connections
minussuperuser_reserved_connections
, new connections will be accepted only for superusers, and no new replication connections will be accepted. + The default value is three connections. The value must be less than the value ofmax_connections
. This parameter can only be set at server start. - [.term]#
unix_socket_directories
(string
) -
Specifies the directory of the Unix-domain socket(s) on which the server is to listen for connections from client applications. Multiple sockets can be created by listing multiple directories separated by commas. Whitespace between entries is ignored; surround a directory name with double quotes if you need to include whitespace or commas in the name. An empty value specifies not listening on any Unix-domain sockets, in which case only TCP/IP sockets can be used to connect to the server. The default value is normally
/tmp
, but that can be changed at build time. This parameter can only be set at server start. + In addition to the socket file itself, which is named.s.PGSQL.`
nnnnwhere
nnnnis the server’s port number, an ordinary file named `.s.PGSQL.`
nnnn.lock` will be created in each of the
unix_socket_directories
directories. Neither file should ever be removed manually. + This parameter is irrelevant on Windows, which does not have Unix-domain sockets. - [.term]#
unix_socket_group
(string
) -
Sets the owning group of the Unix-domain socket(s). (The owning user of the sockets is always the user that starts the server.) In combination with the parameter
unix_socket_permissions
this can be used as an additional access control mechanism for Unix-domain connections. By default this is the empty string, which uses the default group of the server user. This parameter can only be set at server start. + This parameter is irrelevant on Windows, which does not have Unix-domain sockets. - [.term]#
unix_socket_permissions
(integer
) -
Sets the access permissions of the Unix-domain socket(s). Unix-domain sockets use the usual Unix file system permission set. The parameter value is expected to be a numeric mode specified in the format accepted by the
chmod
andumask
system calls. (To use the customary octal format the number must start with a0
(zero).) + The default permissions are0777
, meaning anyone can connect. Reasonable alternatives are0770
(only user and group, see alsounix_socket_group
) and0700
(only user). (Note that for a Unix-domain socket, only write permission matters, so there is no point in setting or revoking read or execute permissions.) + This access control mechanism is independent of the one described in Chapter 20. + This parameter can only be set at server start. + This parameter is irrelevant on systems, notably Solaris as of Solaris 10, that ignore socket permissions entirely. There, one can achieve a similar effect by pointingunix_socket_directories
to a directory having search permission limited to the desired audience. This parameter is also irrelevant on Windows, which does not have Unix-domain sockets. - [.term]#
bonjour
(boolean
) -
Enables advertising the server’s existence via Bonjour. The default is off. This parameter can only be set at server start.
- [.term]#
bonjour_name
(string
) -
Specifies the Bonjour service name. The computer name is used if this parameter is set to the empty string
''
(which is the default). This parameter is ignored if the server was not compiled with Bonjour support. This parameter can only be set at server start. - [.term]#
tcp_keepalives_idle
(integer
) -
Specifies the number of seconds of inactivity after which TCP should send a keepalive message to the client. A value of 0 uses the system default. This parameter is supported only on systems that support
TCP_KEEPIDLE
or an equivalent socket option, and on Windows; on other systems, it must be zero. In sessions connected via a Unix-domain socket, this parameter is ignored and always reads as zero. + [NOTE] ==== ==== NoteOn Windows, a value of 0 will set this parameter to 2 hours, since Windows does not provide a way to read the system default value. ====
- [.term]#
tcp_keepalives_interval
(integer
) -
Specifies the number of seconds after which a TCP keepalive message that is not acknowledged by the client should be retransmitted. A value of 0 uses the system default. This parameter is supported only on systems that support
TCP_KEEPINTVL
or an equivalent socket option, and on Windows; on other systems, it must be zero. In sessions connected via a Unix-domain socket, this parameter is ignored and always reads as zero. + [NOTE] ==== ==== NoteOn Windows, a value of 0 will set this parameter to 1 second, since Windows does not provide a way to read the system default value. ====
- [.term]#
tcp_keepalives_count
(integer
) -
Specifies the number of TCP keepalives that can be lost before the server’s connection to the client is considered dead. A value of 0 uses the system default. This parameter is supported only on systems that support
TCP_KEEPCNT
or an equivalent socket option; on other systems, it must be zero. In sessions connected via a Unix-domain socket, this parameter is ignored and always reads as zero. + [NOTE] ==== ==== NoteThis parameter is not supported on Windows, and must be zero. ====
19.3.2. Security and Authentication
- [.term]#
authentication_timeout
(integer
) -
Maximum time to complete client authentication, in seconds. If a would-be client has not completed the authentication protocol in this much time, the server closes the connection. This prevents hung clients from occupying a connection indefinitely. The default is one minute (
1m
). This parameter can only be set in thepostgresql.conf
file or on the server command line. - [.term]#
ssl
(boolean
) -
Enables SSL connections. Please read Section 18.9 before using this. This parameter can only be set in the
postgresql.conf
file or on the server command line. The default isoff
. - [.term]#
ssl_ca_file
(string
) -
Specifies the name of the file containing the SSL server certificate authority (CA). Relative paths are relative to the data directory. This parameter can only be set in the
postgresql.conf
file or on the server command line. The default is empty, meaning no CA file is loaded, and client certificate verification is not performed. + In previous releases of PostgreSQL, the name of this file was hard-coded asroot.crt
. - [.term]#
ssl_cert_file
(string
) -
Specifies the name of the file containing the SSL server certificate. Relative paths are relative to the data directory. This parameter can only be set in the
postgresql.conf
file or on the server command line. The default isserver.crt
. - [.term]#
ssl_crl_file
(string
) -
Specifies the name of the file containing the SSL client certificate revocation list (CRL). Relative paths are relative to the data directory. This parameter can only be set in the
postgresql.conf
file or on the server command line. The default is empty, meaning no CRL file is loaded. + In previous releases of PostgreSQL, the name of this file was hard-coded asroot.crl
. - [.term]#
ssl_key_file
(string
) -
Specifies the name of the file containing the SSL server private key. Relative paths are relative to the data directory. This parameter can only be set in the
postgresql.conf
file or on the server command line. The default isserver.key
. - [.term]#
ssl_ciphers
(string
) -
Specifies a list of SSL cipher suites that are allowed to be used by SSL connections. See the [.refentrytitle]#ciphers# manual page in the OpenSSL package for the syntax of this setting and a list of supported values. Only connections using TLS version 1.2 and lower are affected. There is currently no setting that controls the cipher choices used by TLS version 1.3 connections. The default value is
HIGH:MEDIUM:+3DES:!aNULL
. The default is usually a reasonable choice unless you have specific security requirements. + This parameter can only be set in thepostgresql.conf
file or on the server command line. + Explanation of the default value: +HIGH
-
Cipher suites that use ciphers from
HIGH
group (e.g., AES, Camellia, 3DES) MEDIUM
-
Cipher suites that use ciphers from
MEDIUM
group (e.g., RC4, SEED) +3DES
-
The OpenSSL default order for
HIGH
is problematic because it orders 3DES higher than AES128. This is wrong because 3DES offers less security than AES128, and it is also much slower.+3DES
reorders it after all otherHIGH
andMEDIUM
ciphers. !aNULL
-
Disables anonymous cipher suites that do no authentication. Such cipher suites are vulnerable to man-in-the-middle attacks and therefore should not be used. + Available cipher suite details will vary across OpenSSL versions. Use the command
openssl ciphers -v 'HIGH:MEDIUM:+3DES:!aNULL'
to see actual details for the currently installed OpenSSL version. Note that this list is filtered at run time based on the server key type.
- [.term]#
ssl_prefer_server_ciphers
(boolean
) -
Specifies whether to use the server’s SSL cipher preferences, rather than the client’s. This parameter can only be set in the
postgresql.conf
file or on the server command line. The default istrue
. + Older PostgreSQL versions do not have this setting and always use the client’s preferences. This setting is mainly for backward compatibility with those versions. Using the server’s preferences is usually better because it is more likely that the server is appropriately configured. - [.term]#
ssl_ecdh_curve
(string
) -
Specifies the name of the curve to use in ECDH key exchange. It needs to be supported by all clients that connect. It does not need to be the same curve used by the server’s Elliptic Curve key. This parameter can only be set in the
postgresql.conf
file or on the server command line. The default isprime256v1
. + OpenSSL names for the most common curves are:prime256v1
(NIST P-256),secp384r1
(NIST P-384),secp521r1
(NIST P-521). The full list of available curves can be shown with the commandopenssl ecparam -list_curves
. Not all of them are usable in TLS though. - [.term]#
password_encryption
(enum
) -
When a password is specified in CREATE ROLE or ALTER ROLE, this parameter determines the algorithm to use to encrypt the password. The default value is
md5
, which stores the password as an MD5 hash (on
is also accepted, as alias formd5
). Setting this parameter toscram-sha-256
will encrypt the password with SCRAM-SHA-256. + Note that older clients might lack support for the SCRAM authentication mechanism, and hence not work with passwords encrypted with SCRAM-SHA-256. See Section 20.3.2 for more details. - [.term]#
ssl_dh_params_file
(string
) -
Specifies the name of the file containing Diffie-Hellman parameters used for so-called ephemeral DH family of SSL ciphers. The default is empty, in which case compiled-in default DH parameters used. Using custom DH parameters reduces the exposure if an attacker manages to crack the well-known compiled-in DH parameters. You can create your own DH parameters file with the command
openssl dhparam -out dhparams.pem 2048
. + This parameter can only be set in thepostgresql.conf
file or on the server command line. - [.term]#
krb_server_keyfile
(string
) -
Sets the location of the Kerberos server key file. See Section 20.3.3 for details. This parameter can only be set in the
postgresql.conf
file or on the server command line. - [.term]#
krb_caseins_users
(boolean
) -
Sets whether GSSAPI user names should be treated case-insensitively. The default is
off
(case sensitive). This parameter can only be set in thepostgresql.conf
file or on the server command line. - [.term]#
db_user_namespace
(boolean
) -
This parameter enables per-database user names. It is off by default. This parameter can only be set in the
postgresql.conf
file or on the server command line. + If this is on, you should create users as `username@dbname. When username
is passed by a connecting client, `@ and the database name are appended to the user name and that database-specific user name is looked up by the server. Note that when you create users with names containing
@
within the SQL environment, you will need to quote the user name. + With this parameter enabled, you can still create ordinary global users. Simply append@
when specifying the user name in the client, e.g.,joe@
. The@
will be stripped off before the user name is looked up by the server. +db_user_namespace
causes the client’s and server’s user name representation to differ. Authentication checks are always done with the server’s user name so authentication methods must be configured for the server’s user name, not the client’s. Becausemd5
uses the user name as salt on both the client and server,md5
cannot be used withdb_user_namespace
. + [NOTE] ==== ==== NoteThis feature is intended as a temporary measure until a complete solution is found. At that time, this option will be removed. ====
Prev | Up | Next |
---|---|---|
19.2. File Locations |
19.4. Resource Consumption |
Copyright © 1996-2023 The PostgreSQL Global Development Group