From: Ruediger Pluem event mpm
uses asynchronous processing to avoid devoting a thread to each
connection. Due to the nature of the OpenSSL library the
@@ -454,10 +454,10 @@
directive specific. Always test your changes when creating dependencies
on how directives are merged.
For modules that don't implement any merging logic, such as
- mod_access_compat, the behavior in later sections
+
For modules that don't implement any merging logic, such as
+ mod_access_compat, the behavior in later sections
depends on whether the later section has any directives
- from the module. The configuration is inherited until a change is made,
+ from the module. The configuration is inherited until a change is made,
at which point the configuration is replaced and not merged.
Bir HTTP Sunucusunu ayarlarken dikkat edilmesi gerekenler ve bazı ipuçları. Ãneriler kısmen Apacheâye özel kısmen de genel olacaktır.
diff --git a/docs/manual/mod/core.html.de b/docs/manual/mod/core.html.de index 210ce2d8606..f78eee9eafe 100644 --- a/docs/manual/mod/core.html.de +++ b/docs/manual/mod/core.html.de @@ -2875,14 +2875,14 @@ On Windows, from Apache 2.3.3 and later.| Beschreibung: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| Syntax: | QualifyRedirectURL ON|OFF |
| Voreinstellung: | QualifyRedirectURL OFF |
| Syntax: | QualifyRedirectURL On|Off |
| Voreinstellung: | QualifyRedirectURL Off |
| Kontext: | Serverkonfiguration, Virtual Host, Verzeichnis |
| AllowOverride: | FileInfo |
| Status: | Core |
| Modul: | core |
| Kompatibilität: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
Die Dokumentation zu dieser Direktive wurde noch nicht übersetzt. Bitte schauen Sie in die englische Version.
diff --git a/docs/manual/mod/core.html.en b/docs/manual/mod/core.html.en index 4c0b2fd7446..d960ed9a3ce 100644 --- a/docs/manual/mod/core.html.en +++ b/docs/manual/mod/core.html.en @@ -4045,19 +4045,19 @@ On Windows, from Apache 2.3.3 and later.| Description: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| Syntax: | QualifyRedirectURL ON|OFF |
| Default: | QualifyRedirectURL OFF |
| Syntax: | QualifyRedirectURL On|Off |
| Default: | QualifyRedirectURL Off |
| Context: | server config, virtual host, directory |
| Override: | FileInfo |
| Status: | Core |
| Module: | core |
| Compatibility: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
This directive controls whether the server will ensure that the
REDIRECT_URL environment variable is fully qualified. By default,
the variable contains the verbatim URL requested by the client,
- such as "/index.html". With QualifyRedirectURL ON, the same request would result in a
+ such as "/index.html". With QualifyRedirectURL On, the same request would result in a
value such as "http://www.example.com/index.html".
Even without this directive set, when a request is issued against a fully qualified URL, REDIRECT_URL will remain fully qualified. @@ -4301,8 +4301,8 @@ scripts so.
-The option Registry-Strict which is new in Apache HTTP Server
- 2.0 does the same thing as Registry but uses only the
+
The option Registry-Strict
+ does the same thing as Registry but uses only the
subkey Shell\ExecCGI\Command. The
ExecCGI key is not a common one. It must be
configured manually in the windows registry and hence prevents
@@ -4581,15 +4581,14 @@ is accessed by an incompatible browser
actually produced a returned error message.
The Off
- setting, which is the default, suppresses the footer line (and is
- therefore compatible with the behavior of Apache-1.2 and
- below). The On setting simply adds a line with the
+ setting, which is the default, suppresses the footer line.
+ The On setting simply adds a line with the
server version number and ServerName of the serving virtual host,
and the EMail setting additionally creates a
"mailto:" reference to the ServerAdmin of the referenced
document.
After version 2.0.44, the details of the server version number +
The details of the server version number
presented are controlled by the ServerTokens directive.
This setting applies to the entire server, and cannot be enabled or disabled on a virtualhost-by-virtualhost basis.
-After version 2.0.44, this directive also controls the +
This directive also controls the
information presented by the ServerSignature directive.
ServerTokens to less than
diff --git a/docs/manual/mod/core.html.es b/docs/manual/mod/core.html.es
index 6c816581867..8614e971f83 100644
--- a/docs/manual/mod/core.html.es
+++ b/docs/manual/mod/core.html.es
@@ -3519,14 +3519,14 @@ On Windows from Apache 2.3.3 and later.
| Descripción: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| Sintaxis: | QualifyRedirectURL ON|OFF |
| Valor por defecto: | QualifyRedirectURL OFF |
| Sintaxis: | QualifyRedirectURL On|Off |
| Valor por defecto: | QualifyRedirectURL Off |
| Contexto: | server config, virtual host, directory |
| Anula: | FileInfo |
| Estado: | Core |
| Módulo: | core |
| Compatibilidad: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
The documentation for this directive has not been translated yet. Please have a look at the English version.
| 説æ: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| æ§æ: | QualifyRedirectURL ON|OFF |
| ããã©ã«ã: | QualifyRedirectURL OFF |
| æ§æ: | QualifyRedirectURL On|Off |
| ããã©ã«ã: | QualifyRedirectURL Off |
| ã³ã³ããã¹ã: | ãµã¼ãè¨å®ãã¡ã¤ã«, ãã¼ãã£ã«ãã¹ã, ãã£ã¬ã¯ã㪠|
| 䏿¸ã: | FileInfo |
| ã¹ãã¼ã¿ã¹: | Core |
| ã¢ã¸ã¥ã¼ã«: | core |
| äºææ§: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
ãã®ãã£ã¬ã¯ãã£ãã®è§£èª¬ææ¸ã¯ ã¾ã 翻訳ããã¦ãã¾ãããè±èªçãã覧ãã ããã
diff --git a/docs/manual/mod/core.html.tr.utf8 b/docs/manual/mod/core.html.tr.utf8 index b56c804a375..685cb78dc1d 100644 --- a/docs/manual/mod/core.html.tr.utf8 +++ b/docs/manual/mod/core.html.tr.utf8 @@ -33,6 +33,7 @@ ja | tr +| Açıklama: | Apache HTTP Sunucusunda daima mevcut olan çekirdek özellikler |
|---|---|
| Durum: | Ãekirdek |
Another option is to render the login form using a CGI script or other dynamic technology.
-AuthFormProvider file - ErrorDocument 401 "/cgi-bin/login.cgi" - ...+
AuthFormProvider file +ErrorDocument 401 "/cgi-bin/login.cgi" +...
| Description: | The name of a form field carrying the body of the request to attempt on successful login |
|---|---|
| Syntax: | AuthFormBody fieldname |
| Default: | httpd_body |
| Default: | AuthFormBody httpd_body |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormMethod directive specifies
- the name of an HTML field which, if present, will contain the method of the request to
+
The AuthFormBody directive specifies
+ the name of an HTML field which, if present, will contain the body of the request
to submit should login be successful.
By populating the form with fields described by @@ -401,7 +401,7 @@ lower level modules
| Description: | Disable the CacheControl no-store header on the login page |
|---|---|
| Syntax: | AuthFormDisableNoStore On|Off |
| Syntax: | AuthFormDisableNoStore On|Off |
| Default: | AuthFormDisableNoStore Off |
| Context: | directory |
| Status: | Base |
| Description: | Fake a Basic Authentication header |
|---|---|
| Syntax: | AuthFormFakeBasicAuth On|Off |
| Syntax: | AuthFormFakeBasicAuth On|Off |
| Default: | AuthFormFakeBasicAuth Off |
| Context: | directory |
| Status: | Base |
| Description: | The name of a form field carrying a URL to redirect to on successful login |
|---|---|
| Syntax: | AuthFormLocation fieldname |
| Default: | httpd_location |
| Default: | AuthFormLocation httpd_location |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Description: | The name of a form field carrying the method of the request to attempt on successful login |
|---|---|
| Syntax: | AuthFormMethod fieldname |
| Default: | httpd_method |
| Default: | AuthFormMethod httpd_method |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormMethod directive specifies
- the name of an HTML field which, if present, will contain the method of the request to
+ the name of an HTML field which, if present, will contain the method of the request
to submit should login be successful.
By populating the form with fields described by @@ -562,13 +562,13 @@ parser has been added in 2.4.4.
| Description: | The name of a form field carrying the mimetype of the body of the request to attempt on successful login |
|---|---|
| Syntax: | AuthFormMimetype fieldname |
| Default: | httpd_mimetype |
| Default: | AuthFormMimetype httpd_mimetype |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormMethod directive specifies
+
The AuthFormMimetype directive specifies
the name of an HTML field which, if present, will contain the
mimetype of the request to submit should login be successful.
| Description: | The name of a form field carrying the login password |
|---|---|
| Syntax: | AuthFormPassword fieldname |
| Default: | httpd_password |
| Default: | AuthFormPassword httpd_password |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Description: | The largest size of the form in bytes that will be parsed for the login details |
|---|---|
| Syntax: | AuthFormSize size |
| Default: | 8192 |
| Default: | AuthFormSize 8192 |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Description: | The name of a form field carrying the login username |
|---|---|
| Syntax: | AuthFormUsername fieldname |
| Default: | httpd_username |
| Default: | AuthFormUsername httpd_username |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Description: | Managing domains across virtual hosts, certificate provisioning via the ACME protocol |
|---|---|
| Status: | Extension |
| Status: | Experimental |
| Module Identifier: | md_module |
| Source File: | mod_md.c |
| Compatibility: | Available in version 2.4.30 and later |
This module manages common properties of domains for one or more virtual hosts. - Its main feature is the use of the ACME protocol - (RFC 8555) - to automate certificate provisioning. Certificates will be renewed - by the module ahead of their expiration to account for disruption in internet - services. There are ways to monitor the status of all Managed Domains - and configurations that will run your own notification commands on renewal, - expiration and errors. -
-- The default ACME Certificate Authority is + Its serves two main purposes: for one, supervise/renew https: certificates via the + ACME protocol (RFC 8555). + Certificates will be renewed by the module ahead of their expiration to account + for disruption in internet services. There are ways to monitor the status of all + certififcates managed this way and configurations that will run your own + notification commands on renewal, expiration and errors. +
+ Second, mod_md offers an alternate OCSP Stapling implementation. This works with + managed certificates as well as with certificates you configure yourself. OCSP + Stapling is a necessary component for any https: site, influencing page load + times and, depending on other setups, page availability. More in the + stapling section below. +
+ The default ACME Authority for managing certificates is Let's Encrypt, but it is possible to configure another CA that supports the protocol.
-This module is experimental. Its behaviors, directives, and - defaults are subject to more change from release to - release relative to other standard modules. Users are encouraged to - consult the "CHANGES" file for potential updates.
-Simple configuration example:
mod_watchdog to be loaded as well.
Certificate sign-up and renewal with Let's Encrypt requires your server to be - reachable on port 80 (http:) from the outside. The alternative method over - port 443 (https:) is currently disabled for security reasons (status from - 2018-01-14). + reachable on port 80 (http:) and/or port 443 (https:) from the public internet. + (Unless your server is configured to use DNS for challenges - more on that under + 'wildcard certificates')
- The module will select from the methods offered by Let's Encrypt. If LE decides - at one point in the future, to re-enable it again, mod_md will - use it when suitable. + The module will select from the methods offered by Let's Encrypt. Usually LE offers + challenges on both ports and DNS and Apache chooses a method available.
- But for now, only the port 80 variant is available (termed "http-01"). Only
- when LE can reach your server on port 80 will mod_md work for
- you. For now, at least.
+ To determine which one is available, the module looks at the ports
+ Apache httpd listens on. If those include port 80, it assumes that the
+ http: challenge (named http-01) is available. If the server listens
+ on port 443, the https: challenge (named tls-alpn-01) is also added to
+ the list. (And if MDChallengeDns01
+ is configured, the challenge dns-01 is added as well.)
- If you do not want to offer any sites on port 80 any more, you may leave it open
- and redirect all requests to your https: sites instead. Use the
- MDRequireHttps described below to do
- that in a convenient fashion. This will continue to answer http: challenges
- from Let's Encrypt.
+ If your setup is not so straight forward, there are two methods available
+ to influence this. First, look at MDPortMap
+ if the server is behind a portmapper, such as a firewall. Second, you may
+ override the module's guesswork completely by configuring
+ MDCAChallenges directly.
+ For domain verification via the TLS protocol `tls-alpn-01` is the name
+ of the challenge type. It requires the Apache server to listen on port 443
+ (see MDPortMap if you map that port
+ to something else).
+
+ Let's Encrypt will open a TLS connection to Apache using the special indicator + `acme-tls/1` (this indication part of TLS is called ALPN, therefore the name + of the challenge. ALPN is also used by browsers to request a HTTP/2 connection). +
+ As with the HTTP/2 protocol, to allow this, you configure: +
+Protocols h2 http/1.1 acme-tls/1+ +
+ And the `tls-alpn-01` challenge type is available. +
+- Wildcard certificates are possible with version 2.x of `mod_md``. But they are - not straight-forward. Let's Encrypt requires the `dns-01` challenge verification + Wildcard certificates are possible, but not straight-forward to use out of + the box. Let's Encrypt requires the `dns-01` challenge verification for those. No other is considered good enough.
- The difficulty here is that Apache cannot do that on its own. (which is also - a security benefit, since corrupting a web server or the communication path to - it is the scenario `dns-01` protects against). As the name implies, `dns-01` + The difficulty here is that Apache cannot do that on its own. As the name implies, `dns-01` requires you to show some specific DNS records for your domain that contain some challenge data. So you need to _write_ your domain's DNS records.
- If you know how to do that, you can integrated this with `mod_md`. Let's + If you know how to do that, you can integrated this with mod_md. Let's say you have a script for that in `/usr/bin/acme-setup-dns` you configure Apache with:
@@ -220,6 +237,52 @@+ If you want to try the stapling in one Managed Domain alone at first, + configure: +
+<MDomain mydomain.net> + MDStapling on +</MDomain>+ +
+ and use the 'server-status' and/or MDMessageCmd to see how it operates. You will + see if Stapling information is there, how long it is valid, from where it came and + when it will be refreshed. +
+ If this all works to your satisfaction, you can switch it on for all your + certificates or just your managed ones. +
+ The existing stapling implementation by mod_ssl is used by many sites + for years. There are two main differences between the mod_ssl and mod_md + one: +
++ If you are unlucky and restart your server during an outage of your CA's + OCSP service, your users may no longer reach your sites. Without persistence + your server cannot provide the client with the data and the client browser + cannot get it as well, since the OCSP service is not responding. +
+ The implementation in mod_md will have peristed it, load it again after + restart and have it available for incoming connections. A day or two before + this information expires, it will renew it, making it able to copy with + a long OCSP service downtime. +
+ Due to backward compatibility, the existing implementation in mod_ssl could + not be changed drastically. For example, mod_ssl is unable to add a dependency + to mod_watchdog without braking many existing installations (that do not load it). +
+
MDCertificateAuthority
MDCertificateFile
MDCertificateKeyFile
MDCertificateMonitor
MDCertificateProtocol
MDCertificateStatus
MDChallengeDns01
MDRenewWindow
MDRequireHttps
MDServerStatus
MDStapleOthers
MDStapling
MDStaplingKeepResponse
MDStaplingRenewWindow
MDStoreDir
MDWarnWindowMDBaseServer on|offMDBaseServer off@@ -279,15 +347,28 @@
MDCAChallenges name [ name ... ]MDCAChallenges tls-alpn-01 http-01 dns-01- Sets challenge types and their execution order when proving domain ownership. - The names are protocol specific. - The current ACME protocol version implemented by Let's Encrypt defines three challenge - types that are supported by mod_md. By default, it will try - the one on port 443 when available. + Sets challenge types (in order of preference) when proving domain ownership. + Supported by the module are the challenge methods 'tls-alpn-01', 'dns-01' + and 'http-01'. The module will look at the overall configuation of the server + to find out which methods can be used. +
+ If the server listens on port 80, for example, the 'http-01' method is available. + The prerequisite for 'dns-01' is a configured 'MDChallengeDns01' command. + 'tls-alpn-01' is described above in 'https: Challenges'. +
+ This auto selection works for most setups. But since Apache is a very powerful + server with many configuration options, the situation is not clear for all + possible cases. For example: it may listen on multiple IP addresses where some + are reachable on `https:` and some not. +
+ If you configure 'MDCAChallenges' directly, this auto selection is disabled. + Instead, the module will use the configured challenge list when talking to + the ACME server (a challenge type must be offered by the server as well). + This challenges are examined in the order specified.
@@ -298,7 +379,7 @@ Authority.MDCertificateAgreement acceptedWhen you use mod_md to obtain a certificate, you become a customer of the CA (e.g. Let's Encrypt). That means you need to read and agree to their Terms of Service, @@ -314,7 +395,7 @@
MDCertificateAuthority urlMDCertificateAuthority https://acme-v02.api.letsencrypt.org/directory@@ -340,7 +421,7 @@
MDCertificateFile path-to-pem-file@@ -384,7 +465,7 @@
MDCertificateKeyFile path-to-file
@@ -396,6 +477,33 @@
SSLCertificateKeyFile directive.
| Description: | The URL of a certificate log monitor. |
|---|---|
| Syntax: | MDCertificateMonitor name url |
| Default: | crt.sh https://crt.sh?q= |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ This is part of the 'server-status' HTML user interface and has nothing to + do with the core functioning itself. It defines the link offered on that + page for easy checking of a certificate monitor. The SHA256 fingerprint + of the certificate is appended to the configured url. +
+ Certificate Monitors offer supervision of Certificate Transparency (CT) + Logs to track the use of certificates for domains. The least you may see + is that Let's Encrypt (or whichever CA you have configured) has entered + your certificates into the CTLogs. +
+ Caveat: certificate logs update and monitor's intakes of those + updates suffer some delay. This varies between logs and monitors. A + brand new certificate will not be known immediately. +
+MDCertificateProtocol protocolMDCertificateProtocol ACME@@ -419,7 +527,7 @@
MDCertificateStatus on|offMDCertificateStatus on@@ -444,7 +552,7 @@
MDChallengeDns01 path-to-command@@ -468,7 +576,7 @@
MDDriveMode always|auto|manualMDDriveMode autoThis directive exists for backward compatibility as the old name for @@ -482,7 +590,7 @@
MDHttpProxy urlUse a http proxy to connect to the MDCertificateAuthority. Define this @@ -496,7 +604,7 @@
MDMember hostname@@ -524,7 +632,7 @@
MDMembers auto|manualMDMembers autoDefines if the ServerName and
@@ -539,12 +647,12 @@
MDMessageCmd path-to-cmd optional-argsThis command gets called when one of the following events happen for - a Managed Domain: "renewed", "expiring", "errored". The command may + a Managed Domain: "renewed", "installed", "expiring", "errored". The command may be invoked for more than these in the future and ignore events it is not prepared to handle.
@@ -563,13 +671,25 @@ MDMessageCmd /etc/apache/md-message return code other than 0 is regarded as an error.
'errored' is no immediate cause for concern since renewal is attempted - early enough to allow the internet to come back. + early enough to allow the internet to come back. This is reported at most + once per hour.
'expiring' should be taken serious. It is issued when the
MDWarnWindow is reached. By default this is
10% of the certificate lifetime, so for Let's Encrypt this currently
means 9 days before it expires. The warning is repeated at most once
a day.
+
+ 'renewed' means that a new certificate has been obtained and is stored + in the 'staging' area in the MD store. It will be activated on the next + server restart/reload. +
+ 'installed' is triggered when a new certificate has been transferred from + staging into the domains location in MD store. This happens at server + startup/reload. Different to all other invocations, MDMessageCmd is run + with root permissions (on *nix systems) and has access to the certificate + files (and keys). Certificates needed for other applications or + in different formats can be processed on this event.
MDMustStaple on|offMDMustStaple offDefines if newly requested certificate should have the OCSP Must Staple flag @@ -597,7 +717,7 @@ MDMessageCmd /etc/apache/md-message
MDNotifyCmd path [ args ]@@ -614,7 +734,7 @@ MDMessageCmd /etc/apache/md-message
MDomain dns-name [ other-dns-name... ] [auto|manual]@@ -696,7 +816,7 @@ MDomain example2.org auto
<MDomainSet dns-name [ other-dns-name... ]>...</MDomainSet>@@ -729,7 +849,7 @@ MDomain example2.org auto
MDPortMap map1 [ map2 ]MDPortMap http:80 https:443@@ -772,7 +892,7 @@ MDomain example2.org auto
MDPrivateKeys type [ params... ]MDPrivateKeys RSA 2048@@ -803,7 +923,7 @@ MDomain example2.org auto
MDRenewMode always|auto|manualMDRenewMode auto@@ -835,7 +955,7 @@ MDomain example2.org auto
MDRenewWindow durationMDRenewWindow 33%@@ -869,7 +989,7 @@ MDRenewWindow 10%
MDRequireHttps off|temporary|permanentMDRequireHttps offThis is a convenience directive to ease http: to https: migration of @@ -925,7 +1045,7 @@ MDRenewWindow 10%
MDServerStatus on|offMDServerStatus on@@ -936,6 +1056,109 @@ MDRenewWindow 10% You can switch that off using this directive.
+ + +| Description: | Enable stapling for certificates not managed by mod_md. |
|---|---|
| Syntax: | MDStapleOthers on|off |
| Default: | on |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ This setting only takes effect when `MDStapling` is enabled. It controls + if `mod_md` should also provide stapling information for certificates + that are not directly controlled by it, e.g. renewed via an ACME CA. +
+ +| Description: | Enable stapling for all or a particular MDomain. |
|---|---|
| Syntax: | MDStapling on|off |
| Default: | off |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ mod_md offers an implementation for providing OCSP stapling information. + This is an alternative to the one provided by 'mod_ssl'. For backward + compatiblity, this is disabled by default. +
+ The stapling can be switched on for all certificates on the server or + for an individual MDomain. This will replace any stapling configurtion + in `mod_ssl` for these hosts. When disabled, the 'mod_ssl' stapling + will do the work (if it is itself enabled, of course). This allows for + a gradual shift over from one implementation to the other. +
+ The stapling of `mod_md` will also work for domains where the certificates + are not managed by this module (see MDStapleOthers for how to control this). + This allows use of the new stapling without using any ACME certificate + management. +
+ +| Description: | Controls when old responses should be removed. |
|---|---|
| Syntax: | MDStaplingKeepResponse duration |
| Default: | 7d |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ This time window specifies when OCSP response data used in stapling + shall be removed from the store again. Response information older than + 7 days (default) is deleted on server restart/reload. This keeps the store + from growing when certificates are renewed/reconfigured frequently. +
+
+ +| Description: | Control when the stapling responses will be renewed. |
|---|---|
| Syntax: | MDStaplingRenewWindow duration |
| Default: | 33% |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ If the validity of the OCSP response used in stapling falls below 'duration', + mod_md will obtain a new OCSP response. +
+ The CA issueing a certificate commonly also operates the OCSP responder + service and determines how long its signed response about the validity + of a certificate are itself valid. The longer a response is valid, the longer + it can be cached which mean better overall performance for everyone. + The shorter the life time, the more rapidly certificate revocations + spread to clients. Also, service reliability is a consideration. +
+ By adjusting the stapling renew window you can control parts of this yourself. + If you make the renew time short (e.g. a short time before the current + information expires), you gain maximum cache time. But a service outage + (down for maintenance, for example) will affect you. If you renew a long + time before expiry, updates will be made more frequent, cause more load + on the CA server infrastructure and also more coordination between + the child processes of your server. +
+ The default is chosen as 33%, which means renewal is started when only + a third of the response lifetime is left. For a CA that issues OCSP + responses with lifetime of 3 days, this means 2 days of caching and 1 day + for renewal attempts. A service outage would have to last full 24 hours + to affect your domains. +
+ Setting an absolute renew window, like `2d` (2 days), is also possible. +
+MDStoreDir pathMDStoreDir md@@ -966,7 +1189,7 @@ MDRenewWindow 10%
MDWarnWindow durationMDWarnWindow 10%diff --git a/docs/manual/mod/mod_proxy_uwsgi.html.en b/docs/manual/mod/mod_proxy_uwsgi.html.en index da510e4f8a6..06ea7411db9 100644 --- a/docs/manual/mod/mod_proxy_uwsgi.html.en +++ b/docs/manual/mod/mod_proxy_uwsgi.html.en @@ -26,7 +26,8 @@
| Description: | UWSGI gateway module for mod_proxy |
|---|---|
| Status: | Extension |