From: Rainer Jung
-%m
The request method.
-
- %M
The time taken to serve the request, in milliseconds.
- (available in 2.4.13 and later)
+%{VARNAME}n
-%{VARNAME}n
The contents of note VARNAME from another
module.
+%{VARNAME}o
-%{VARNAME}o
The contents of VARNAME:
header line(s)
in the reply.
+%p
-%p
The canonical port of the server serving the request.
+%{format}p
-%{format}p
The canonical port of the server serving the request, or the
server's actual port, or the client's actual port. Valid formats
are canonical
, local
, or remote
.
+%P
-%P
The process ID of the child that serviced the request.
+%{format}P
-%{format}P
The process ID or thread ID of the child that serviced the
request. Valid formats are pid
, tid
,
and hextid
. hextid
requires APR 1.2.0 or
higher.
+%q
-%q
The query string (prepended with a ?
if a query
string exists, otherwise an empty string).
+%r
-%r
First line of request.
+%R
-%R
The handler generating the response (if any).
+%s
-%s
Status. For requests that have been internally redirected, this is
the status of the original request. Use %>s
for the final status.
+%t
-%t
Time the request was received, in the format [18/Sep/2011:19:18:28 -0400]
.
The last number indicates the timezone offset from GMT
+%{format}t
-%{format}t
The time, in the form given by format, which should be in
an extended strftime(3)
format (potentially localized).
If the format starts with begin:
(default) the time is taken
@@ -201,8 +198,16 @@
formatting in the same format string. You can use multiple
%{format}t
tokens instead.
+%T
+%T
The time taken to serve the request, in seconds.
+ %{UNIT}T
The time taken to serve the request, in a time unit given by
+ UNIT
. Valid units are ms
for milliseconds,
+ us
for microseconds, and s
for seconds.
+ Using s
gives the same result as %T
+ without any format; using us
gives the same result
+ as %D
. Combining %T
with a unit is
+ available in 2.4.13 and later.
diff --git a/docs/manual/mod/mod_ssl.html.en b/docs/manual/mod/mod_ssl.html.en
index f1b2b61862a..9d7274bf7ad 100644
--- a/docs/manual/mod/mod_ssl.html.en
+++ b/docs/manual/mod/mod_ssl.html.en
@@ -566,35 +566,44 @@ confused in this situation.%u
Remote user if the request was authenticated. May be bogus if return status
( %s
) is 401 (unauthorized).
This directive points to a file with certificate data in PEM format.
At a minimum, the file must include an end-entity (leaf) certificate.
-Beginning with version 2.4.8, it may also include intermediate CA
-certificates, sorted from leaf to root, and obsoletes
-SSLCertificateChainFile
.
+The directive can be used multiple times (referencing different filenames)
+to support multiple algorithms for server authentication - typically
+RSA, DSA, and ECC. The number of supported algorithms depends on the
+OpenSSL version being used for mod_ssl: with version 1.0.0 or later,
+openssl list-public-key-algorithms
will output a list
+of supported algorithms.
-Additional optional elements are DH parameters and/or an EC curve name
-for ephemeral keys, as generated by openssl dhparam
and
-openssl ecparam
, respectively (supported in version 2.4.7
-or later) and finally, the end-entity certificate's private key.
-If the private key is encrypted, the pass phrase dialog is forced
-at startup time.
SSLCertificateChainFile
.
+When running with OpenSSL 1.0.2 or later, this allows
+to configure the intermediate CA chain on a per-certificate basis.
+
-This directive can be used multiple times (referencing different filenames)
-to support multiple algorithms for server authentication - typically
-RSA, DSA, and ECC. The number of supported algorithms depends on the
-OpenSSL version being used for mod_ssl: with version 1.0.0 or later,
-openssl list-public-key-algorithms
will output a list
-of supported algorithms.
SSLCertificateChainFile
.
+This is supported in version 2.4.7 or later.
+Such parameters can be generated using the commands
+openssl dhparam
and openssl ecparam
.
+The parameters can be added as-is to the end of the first
+certificate file. Only the first file can be used for custom
+parameters, as they are applied independently of the authentication
+algorithm type.
+
-When running with OpenSSL 1.0.2 or later, this directive allows
-to configure the intermediate CA chain on a per-certificate basis,
-which removes a limitation of the (now obsolete)
-SSLCertificateChainFile
directive.
-DH and ECDH parameters, however, are only read from the first
-SSLCertificateFile
directive, as they
-are applied independently of the authentication algorithm type.
SSLCertificateKeyFile
+directive. This practice is highly discouraged. If it is used,
+the certificate files using such an embedded key must be configured
+after the certificates using a separate key file. If the private
+key is encrypted, the pass phrase dialog is forced at startup time.
+
This directive points to the PEM-encoded private key file for the
-server (the private key may also be combined with the certificate in the
-SSLCertificateFile
, but this practice
-is discouraged). If the contained private key is encrypted, the pass phrase
+server. If the contained private key is encrypted, the pass phrase
dialog is forced at startup time.
@@ -639,6 +646,13 @@ to support multiple algorithms for server authentication. For each
directive, there must be a matching SSLCertificateFile
directive.
+The private key may also be combined with the certificate in the file given by
+SSLCertificateFile
, but this practice
+is highly discouraged. If it is used, the certificate files using such
+an embedded key must be configured after the certificates using a separate
+key file.
SSLCertificateKeyFile "/usr/local/apache2/conf/ssl.key/server.key"
Ticket keys should be rotated (replaced) on a frequent basis, as this is the only way to invalidate an existing session ticket - -OpenSSL currently doesn't allow to specify a limit for ticket lifetimes.
+OpenSSL currently doesn't allow to specify a limit for ticket lifetimes. +A new ticket key only gets used after restarting the web server. +All existing session tickets become invalid after a restart.The ticket key file contains sensitive keying material and should
@@ -2266,10 +2282,6 @@ With the exception of none
and nonenotnull
,
the same storage types are supported as with
SSLSessionCache
.
The ssl-stapling
mutex is used to serialize access to the
-OCSP stapling cache to prevent corruption. This mutex can be configured
-using the Mutex
directive.
When OCSP stapling is enabled, the ssl-stapling
mutex is used
+to control access to the OCSP stapling cache in order to prevent corruption,
+and the sss-stapling-refresh
mutex is used to control refreshes
+of OCSP responses. These mutexes can be configured using the
+Mutex
directive.
+
Description: | Chiffrement de haut niveau basé sur les protocoles Secure Sockets Layer (SSL) et Transport Layer Security (TLS) |
---|---|
Statut: | Extension |