<ul>
<li>
- <a href="http://purl.org/NET/http-errata">
- http://purl.org/NET/http-errata</a> - HTTP/1.1 Specification Errata
+ <a href="https://www.skrb.org/ietf/http_errata.html">
+ https://www.skrb.org/ietf/http_errata.html</a> - HTTP/1.1 Specification Errata
</li>
<li>
<a href="http://www.rfc-editor.org/errata.php">
CERN users who can exploit this module.</p>
<p>More information on the <a
- href="http://www.w3.org/pub/WWW/Daemon/User/Config/General.html#MetaDir"
+ href="https://www.w3.org/Daemon/User/Config/General.html#MetaDir"
>CERN metafile semantics</a> is available.</p>
</summary>
<p>This module provides an implementation of Certificate Transparency, in
conjunction with <module>mod_ssl</module> and command-line tools from the
-<a href="https://code.google.com/p/certificate-transparency/">certificate-transparency</a>
+<a href="https://certificate.transparency.dev/">certificate-transparency</a>
open source project. The goal of Certificate Transparency is to expose the
use of server certificates which are trusted by browsers but were mistakenly
or maliciously issued. More information about Certificate Transparency is
<p><em>executable</em> is the full path to the log client tool, which is
normally file <code>cpp/client/ct</code> (or <code>ct.exe</code>) within the
source tree of the
- <a href="https://code.google.com/p/certificate-transparency/">
+ <a href="https://certificate.transparency.dev/">
certificate-transparency</a> open source project.</p>
<p>An alternative implementation could be used to retrieve SCTs for a
<highlight language="config">
# "Modern" configuration, defined by the Mozilla Foundation's SSL Configuration
# Generator as of August 2016. This tool is available at
-# https://mozilla.github.io/server-side-tls/ssl-config-generator/
+# https://ssl-config.mozilla.org/
SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1
# Many ciphers defined here require a modern version (1.0.1+) of OpenSSL. Some
# require OpenSSL 1.1.0, which as of this writing was in pre-release.