Hi!
Or, if you want to check/enforce this from the server side,
you could enable log_connections and see what's logged;
or simply change pg_hba.conf to disallow non-SSL connections.
I set log_connections =on
pg_hba.conf contains :
local all postgres tru
"Andrus" writes:
> log file does not show ssl connection info:
> 2019-03-22 16:49:03 EET [unknown] [unknown] LOG:
> connection received: host=xx.xx.xx.xx port=54590
> 2019-03-22 16:49:04 EET testuseryle LOG: connection
> authorized: user=testuser databas
There is an extension:
https://www.postgresql.org/docs/9.1/sslinfo.html
Andrus.
Posted also in
https://stackoverflow.com/questions/55296044/how-to-check-is-connection-encrypted
--
Adrian Klaver
adrian.kla...@aklaver.com
"Andrus" writes:
> Client accesses server from Windows 10 using psqlODBC driver with
> sslmode=allow in connection string.
> How to verify that connection is encrypted ?
When using libpq directly, you could use PQsslInUse(),
or PQsslAttribute() for more detailed info. I'm not
sure if ODBC provi
in
https://stackoverflow.com/questions/55296044/how-to-check-is-connection-encrypted