-using Unix credentials passing. When running clients over a network,
-authentication can be done using either PAM, Kerberos 5 (requires the
-MIT libraries) or client trust (no authentication). Unix credentials
-passing and Kerberos authentication should be perfectly secure. PAM
-authentication should be secure in itself, but the client protocol is
-not encrypted, and therefore causes passwords to be sent over the
-network in the clear. Authentication-less operation is, obviously, not
-secure at all and is disabled by default. It may be useful on a
-trusted network, however.
+using Unix credentials passing.
+.P
+When running clients over a network, authentication can be done using
+either PAM, Kerberos 5 (requires the MIT libraries) or client trust
+(no authentication). Unix credentials passing and Kerberos
+authentication should be perfectly secure. PAM authentication should
+be secure in itself, but the client protocol is not encrypted, and
+therefore causes passwords to be sent over the network in the
+clear. Authentication-less operation is, obviously, not secure at all
+and is disabled by default. It may be useful on a trusted network,
+however.