@@ -1986,10 +1986,10 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
19861986 <quote>intermediate</> certificate authority, rather than one that is
19871987 directly trusted by clients. To use such a certificate, append the
19881988 certificate of the signing authority to the <filename>server.crt</> file,
1989- then its parent authority's certificate, and so on up to a <quote>root</>
1990- authority that is trusted by the clients. The root certificate should
1991- be included in every case where <filename>server.crt</> contains more than
1992- one certificate .
1989+ then its parent authority's certificate, and so on up to a certificate
1990+ authority, <quote>root</> or <quote>intermediate</>, that is trusted by
1991+ clients, i.e. signed by a certificate in the clients'
1992+ <filename>root.crt</filename> files .
19931993 </para>
19941994
19951995 <sect2 id="ssl-client-certificates">
@@ -2008,7 +2008,10 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
20082008 SSL connection startup. (See <xref linkend="libpq-ssl"> for a
20092009 description of how to set up certificates on the client.) The server will
20102010 verify that the client's certificate is signed by one of the trusted
2011- certificate authorities. Certificate Revocation List (CRL) entries
2011+ certificate authorities. If intermediate <acronym>CA</>s appear in
2012+ <filename>root.crt</filename>, the file must also contain certificate
2013+ chains to their root <acronym>CA</>s. Certificate Revocation List
2014+ (CRL) entries
20122015 are also checked if the parameter <xref linkend="guc-ssl-crl-file"> is set.
20132016 <!-- If this URL changes replace it with a URL to www.archive.org. -->
20142017 (See <ulink
@@ -2026,8 +2029,9 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
20262029 </para>
20272030
20282031 <para>
2029- Note that <filename>root.crt</filename> lists the top-level CAs that are
2030- considered trusted for signing client certificates. In principle it need
2032+ Note that the server's <filename>root.crt</filename> lists the top-level
2033+ CAs that are considered trusted for signing client certificates.
2034+ In principle it need
20312035 not list the CA that signed the server's certificate, though in most cases
20322036 that CA would also be trusted for client certificates.
20332037 </para>
0 commit comments