@@ -691,7 +691,7 @@ include_dir <replaceable>directory</replaceable>
691691 entire <literal>Distinguished Name (DN)</literal> of the certificate.
692692 This option is probably best used in conjunction with a username map.
693693 The comparison is done with the <literal>DN</literal> in
694- <ulink url="https://tools .ietf.org/html/rfc2253">RFC 2253</ulink>
694+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2253">RFC 2253</ulink>
695695 format. To see the <literal>DN</literal> of a client certificate
696696 in this format, do
697697<programlisting>
@@ -1090,7 +1090,7 @@ omicron bryanh guest1
10901090 <para>
10911091 <link linkend="auth-ident">Ident authentication</link>, which
10921092 relies on an <quote>Identification Protocol</quote>
1093- (<ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>)
1093+ (<ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>)
10941094 service on the client's machine. (On local Unix-socket connections,
10951095 this is treated as peer authentication.)
10961096 </para>
@@ -1229,7 +1229,7 @@ omicron bryanh guest1
12291229 <para>
12301230 The method <literal>scram-sha-256</literal> performs SCRAM-SHA-256
12311231 authentication, as described in
1232- <ulink url="https://tools .ietf.org/html/rfc7677">RFC 7677</ulink>. It
1232+ <ulink url="https://datatracker .ietf.org/doc /html/rfc7677">RFC 7677</ulink>. It
12331233 is a challenge-response scheme that prevents password sniffing on
12341234 untrusted connections and supports storing passwords on the server in a
12351235 cryptographically hashed form that is thought to be secure.
@@ -1336,7 +1336,7 @@ omicron bryanh guest1
13361336 <para>
13371337 <productname>GSSAPI</productname> is an industry-standard protocol
13381338 for secure authentication defined in
1339- <ulink url="https://tools .ietf.org/html/rfc2743">RFC 2743</ulink>.
1339+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2743">RFC 2743</ulink>.
13401340 <productname>PostgreSQL</productname>
13411341 supports <productname>GSSAPI</productname> for authentication,
13421342 communications encryption, or both.
@@ -1651,7 +1651,7 @@ omicron bryanh guest1
16511651
16521652 <para>
16531653 The <quote>Identification Protocol</quote> is described in
1654- <ulink url="https://tools .ietf.org/html/rfc1413">RFC 1413</ulink>.
1654+ <ulink url="https://datatracker .ietf.org/doc /html/rfc1413">RFC 1413</ulink>.
16551655 Virtually every Unix-like
16561656 operating system ships with an ident server that listens on TCP
16571657 port 113 by default. The basic functionality of an ident server
@@ -1820,7 +1820,7 @@ omicron bryanh guest1
18201820 <para>
18211821 Set to 1 to make the connection between PostgreSQL and the LDAP server
18221822 use TLS encryption. This uses the <literal>StartTLS</literal>
1823- operation per <ulink url="https://tools .ietf.org/html/rfc4513">RFC 4513</ulink>.
1823+ operation per <ulink url="https://datatracker .ietf.org/doc /html/rfc4513">RFC 4513</ulink>.
18241824 See also the <literal>ldapscheme</literal> option for an alternative.
18251825 </para>
18261826 </listitem>
@@ -1915,7 +1915,7 @@ omicron bryanh guest1
19151915 <term><literal>ldapurl</literal></term>
19161916 <listitem>
19171917 <para>
1918- An <ulink url="https://tools .ietf.org/html/rfc4516">RFC 4516</ulink>
1918+ An <ulink url="https://datatracker .ietf.org/doc /html/rfc4516">RFC 4516</ulink>
19191919 LDAP URL. This is an alternative way to write some of the
19201920 other LDAP options in a more compact and standard form. The format is
19211921<synopsis>
@@ -1978,7 +1978,7 @@ ldap[s]://<replaceable>host</replaceable>[:<replaceable>port</replaceable>]/<rep
19781978 <productname>OpenLDAP</productname> as the LDAP client library, the
19791979 <literal>ldapserver</literal> setting may be omitted. In that case, a
19801980 list of host names and ports is looked up via
1981- <ulink url="https://tools .ietf.org/html/rfc2782">RFC 2782</ulink> DNS SRV records.
1981+ <ulink url="https://datatracker .ietf.org/doc /html/rfc2782">RFC 2782</ulink> DNS SRV records.
19821982 The name <literal>_ldap._tcp.DOMAIN</literal> is looked up, where
19831983 <literal>DOMAIN</literal> is extracted from <literal>ldapbasedn</literal>.
19841984 </para>
0 commit comments