diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml
index 60a06590fec..98752c2875c 100644
--- a/doc/src/sgml/runtime.sgml
+++ b/doc/src/sgml/runtime.sgml
@@ -1922,7 +1922,7 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
- The simplest way to prevent spoofing for local>
+ On way to prevent spoofing of local>
connections is to use a Unix domain socket directory () that has write permission only
for a trusted local user. This prevents a malicious user from creating
@@ -1934,6 +1934,13 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
/tmp> cleanup script to prevent removal of the symbolic link.
+
+ Another option for local> connections is for clients to use
+ requirepeer>>
+ to specify the required owner of the server process connected to
+ the socket.
+
+
To prevent spoofing on TCP connections, the best solution is to use
SSL certificates and make sure that clients check the server's certificate.