@@ -412,7 +412,7 @@ hostnossl <replaceable>database</replaceable> <replaceable>user</replaceable>
412412 </varlistentry>
413413
414414 <varlistentry>
415- <term><literal>scram</></term>
415+ <term><literal>scram-sha-256 </></term>
416416 <listitem>
417417 <para>
418418 Perform SCRAM-SHA-256 authentication to verify the user's
@@ -683,7 +683,7 @@ host postgres all 192.168.93.0/24 ident
683683# "postgres" if the user's password is correctly supplied.
684684#
685685# TYPE DATABASE USER ADDRESS METHOD
686- host postgres all 192.168.12.10/32 scram
686+ host postgres all 192.168.12.10/32 scram-sha-256
687687
688688# Allow any user from hosts in the example.com domain to connect to
689689# any database if the user's password is correctly supplied.
@@ -694,7 +694,7 @@ host postgres all 192.168.12.10/32 scram
694694#
695695# TYPE DATABASE USER ADDRESS METHOD
696696host all mike .example.com md5
697- host all all .example.com scram
697+ host all all .example.com scram-sha-256
698698
699699# In the absence of preceding "host" lines, these two lines will
700700# reject all connections from 192.168.54.1 (since that entry will be
@@ -922,7 +922,7 @@ omicron bryanh guest1
922922 </indexterm>
923923
924924 <para>
925- The password-based authentication methods are <literal>scram</>,
925+ The password-based authentication methods are <literal>scram-sha-256 </>,
926926 <literal>md5</>, and <literal>password</>. These methods operate
927927 similarly except for the way that the password is sent across the
928928 connection.
@@ -939,8 +939,9 @@ omicron bryanh guest1
939939
940940
941941 <para>
942- <literal>scram</> performs SCRAM-SHA-256 authentication, as described
943- in <ulink url="https://tools.ietf.org/html/rfc5802">RFC5802</ulink>. It
942+ <literal>scram-sha-256</> performs SCRAM-SHA-256 authentication, as
943+ described in
944+ <ulink url="https://tools.ietf.org/html/rfc5802">RFC5802</ulink>. It
944945 is a challenge-response scheme, that prevents password sniffing on
945946 untrusted connections. It is more secure than the <literal>md5</>
946947 method, but might not be supported by older clients.
@@ -953,7 +954,7 @@ omicron bryanh guest1
953954 protection if an attacker manages to steal the password hash from the
954955 server, and it cannot be used with the <xref
955956 linkend="guc-db-user-namespace"> feature. For all other users,
956- <literal>md5</> works the same as <literal>scram</>.
957+ <literal>md5</> works the same as <literal>scram-sha-256 </>.
957958 </para>
958959
959960 <para>
0 commit comments