From: Daniel Gruno
Date: Fri, 27 Apr 2012 06:14:04 +0000 (+0000)
Subject: Syntax updates for mod_ssl.xml (yes, everything is a freaky carnival tent now)
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=5244591037b52365a8bfd0f5123d53e606300c03;p=thirdparty%2Fapache%2Fhttpd.git
Syntax updates for mod_ssl.xml (yes, everything is a freaky carnival tent now)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1331234 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml
index 1513b3cacc9..9a40a4d7c0c 100644
--- a/docs/manual/mod/mod_ssl.xml
+++ b/docs/manual/mod/mod_ssl.xml
@@ -169,8 +169,9 @@ For backward compatibility there is additionally a special
provided. Information about this function is provided in the Compatibility chapter.
Example
-CustomLog logs/ssl_request_log \
- "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
+
+CustomLog logs/ssl_request_log "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
+
@@ -214,9 +215,9 @@ string in mod_log_config.
encrypted with SSL. This is similar to the
SSLRequireSSL directive.
-
+
Require ssl
-
+
@@ -229,10 +230,10 @@ string in mod_log_config.
The following example grants access if the user is authenticated
either with a client certificate or by username and password.
-
+
Require ssl-verify-client
Require valid-user
-
+
@@ -311,7 +312,9 @@ query can be done in two ways which can be configured by
program is called only once per unique Pass Phrase.
Example
+
SSLPassPhraseDialog exec:/usr/local/apache/sbin/pp-filter
+
@@ -391,13 +394,15 @@ The following source variants are available:
on your platform.
Example
-SSLRandomSeed startup builtin
-SSLRandomSeed startup file:/dev/random
-SSLRandomSeed startup file:/dev/urandom 1024
-SSLRandomSeed startup exec:/usr/local/bin/truerand 16
-SSLRandomSeed connect builtin
-SSLRandomSeed connect file:/dev/random
-SSLRandomSeed connect file:/dev/urandom 1024
+
+SSLRandomSeed startup builtin
+SSLRandomSeed startup file:/dev/random
+SSLRandomSeed startup file:/dev/urandom 1024
+SSLRandomSeed startup exec:/usr/local/bin/truerand 16
+SSLRandomSeed connect builtin
+SSLRandomSeed connect file:/dev/random
+SSLRandomSeed connect file:/dev/urandom 1024
+
@@ -468,8 +473,10 @@ The following five storage types are currently supported:
Examples
-SSLSessionCache dbm:/usr/local/apache/logs/ssl_gcache_data
+
+SSLSessionCache dbm:/usr/local/apache/logs/ssl_gcache_data
SSLSessionCache shmcb:/usr/local/apache/logs/ssl_gcache_data(512000)
+
The ssl-cache mutex is used to serialize access to
@@ -494,7 +501,9 @@ global/inter-process SSL Session Cache and the OpenSSL internal memory cache.
It can be set as low as 15 for testing, but should be set to higher
values like 300 in real life.
Example
+
SSLSessionCacheTimeout 600
+
@@ -515,10 +524,12 @@ type="section">VirtualHost section to enable SSL/TLS for a
that virtual host. By default the SSL/TLS Protocol Engine is
disabled for both the main server and all configured virtual hosts.
Example
-<VirtualHost _default_:443>
-SSLEngine on
-...
+
+<VirtualHost _default_:443>
+SSLEngine on
+#...
</VirtualHost>
+
In Apache 2.1 and later, SSLEngine can be set to
optional. This enables support for
@@ -599,7 +610,9 @@ The available (case-insensitive) protocols are:
``+SSLv3 +TLSv1 +TLSv1.1 +TLSv1.2, respectively.
Example
+
SSLProtocol TLSv1
+
@@ -729,7 +742,9 @@ KRB5-RC4-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=SHA1
The complete list of particular RSA & DH ciphers for SSL is given in Table 2.
Example
+
SSLCipherSuite RSA:!EXP:!NULL:+HIGH:+MEDIUM:-LOW
+
@@ -787,7 +802,9 @@ Pass Phrase dialog is forced at startup time. This directive can be used up to
two times (referencing different filenames) when both a RSA and a DSA based
server certificate is used in parallel.
Example
+
SSLCertificateFile /usr/local/apache2/conf/ssl.crt/server.crt
+
@@ -814,7 +831,9 @@ at startup time. This directive can be used up to two times
(referencing different filenames) when both a RSA and a DSA based
private key is used in parallel.
Example
+
SSLCertificateKeyFile /usr/local/apache2/conf/ssl.key/server.key
+
@@ -853,7 +872,9 @@ using a coupled RSA+DSA certificate pair, this will work only if actually both
certificates use the same certificate chain. Else the browsers will be
confused in this situation.
Example
+
SSLCertificateChainFile /usr/local/apache2/conf/ssl.crt/ca.crt
+
@@ -878,7 +899,9 @@ there: you also have to create symbolic links named
hash-value.N. And you should always make sure this directory
contains the appropriate symbolic links.
Example
+
SSLCACertificatePath /usr/local/apache2/conf/ssl.crt/
+
@@ -900,7 +923,9 @@ concatenation of the various PEM-encoded Certificate files, in order of
preference. This can be used alternatively and/or additionally to
SSLCACertificatePath.
Example
+
SSLCACertificateFile /usr/local/apache2/conf/ssl.crt/ca-bundle-client.crt
+
@@ -945,7 +970,9 @@ specify an all-in-one file containing a concatenation of
PEM-encoded CA certificates.
Example
+
SSLCADNRequestFile /usr/local/apache2/conf/ca-names.crt
+
@@ -972,7 +999,9 @@ Certificate files there: you also have to create symbolic links named
hash-value.N. And you should always make sure
this directory contains the appropriate symbolic links.
Example
+
SSLCADNRequestPath /usr/local/apache2/conf/ca-names.crt/
+
@@ -997,7 +1026,9 @@ Additionally you have to create symbolic links named
hash-value.rN. And you should always make sure this directory
contains the appropriate symbolic links.
Example
+
SSLCARevocationPath /usr/local/apache2/conf/ssl.crl/
+
@@ -1020,7 +1051,9 @@ the various PEM-encoded CRL files, in order of preference. This can be
used alternatively and/or additionally to SSLCARevocationPath.
Example
+
SSLCARevocationFile /usr/local/apache2/conf/ssl.crl/ca-bundle-client.crl
+
@@ -1057,7 +1090,9 @@ to succeed - otherwise it will fail with an
Example
+
SSLCARevocationCheck chain
+
@@ -1101,7 +1136,9 @@ The following levels are available for level:
optional_no_ca is actually against the idea of
authentication (but can be used to establish SSL test pages, etc.)
Example
+
SSLVerifyClient require
+
@@ -1136,7 +1173,9 @@ certificate can be self-signed or has to be signed by a CA which is directly
known to the server (i.e. the CA's certificate is under
SSLCACertificatePath), etc.
Example
+
SSLVerifyDepth 10
+
@@ -1242,10 +1281,12 @@ The available options are:
Example
-SSLOptions +FakeBasicAuth -StrictRequire
-<Files ~ "\.(cgi|shtml)$">
- SSLOptions +StdEnvVars -ExportCertData
+
+SSLOptions +FakeBasicAuth -StrictRequire
+<Files ~ "\.(cgi|shtml)$">
+ SSLOptions +StdEnvVars -ExportCertData
<Files>
+
@@ -1267,7 +1308,9 @@ host or directories for defending against configuration errors that expose
stuff that should be protected. When this directive is present all requests
are denied which are not using SSL.
Example
+
SSLRequireSSL
+
@@ -1358,12 +1401,14 @@ both parsed and executed each time the .htaccess file is encountered during
request processing.
Example
-SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \
+
+SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \
and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \
and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \
and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \
and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 ) \
- or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/
+ or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/
+
The PeerExtList(object-ID) function expects
@@ -1375,7 +1420,9 @@ exactly against the value of an extension identified with this OID.
extension must match).
Example
+
SSLRequire "foobar" in PeerExtList("1.2.3.4.5.6")
+
Notes on the PeerExtList function
@@ -1432,7 +1479,9 @@ memory must be considered when changing this configuration setting.
Example
+
SSLRenegBufferSize 262144
+
@@ -1464,7 +1513,9 @@ version of OpenSSL.
Example
+
SSLStrictSNIVHostCheck on
+
@@ -1489,7 +1540,9 @@ directory contains the appropriate symbolic links.
Currently there is no support for encrypted private keys
Example
+
SSLProxyMachineCertificatePath /usr/local/apache2/conf/proxy.crt/
+
@@ -1516,7 +1569,9 @@ or additionally to SSLProxyMachineCertificatePath.
Currently there is no support for encrypted private keys
Example
+
SSLProxyMachineCertificateFile /usr/local/apache2/conf/ssl.crt/proxy.pem
+
@@ -1546,7 +1601,9 @@ trusted as if they were also in
SSLProxyCACertificateFile.
Example
+
SSLProxyMachineCertificateChainFile /usr/local/apache2/conf/ssl.crt/proxyCA.pem
+
@@ -1583,7 +1640,9 @@ The following levels are available for level:
optional_no_ca is actually against the idea of
authentication (but can be used to establish SSL test pages, etc.)
Example
+
SSLProxyVerify require
+
@@ -1610,7 +1669,9 @@ the remote server certificate can be self-signed or has to be signed by a CA
which is directly known to the server (i.e. the CA's certificate is under
SSLProxyCACertificatePath), etc.
Example
+
SSLProxyVerifyDepth 10
+
@@ -1631,7 +1692,9 @@ is expired or not. If the check fails a 502 status code (Bad Gateway) is
sent.
Example
+
SSLProxyCheckPeerExpire on
+
@@ -1652,7 +1715,9 @@ compared against the hostname of the request URL. If both are not equal
a 502 status code (Bad Gateway) is sent.
Example
+
SSLProxyCheckPeerCN on
+
@@ -1673,10 +1738,12 @@ type="section">VirtualHost section to enable SSL/TLS for proxy
usage in a particular virtual host. By default the SSL/TLS Protocol Engine is
disabled for proxy image both for the main server and all configured virtual hosts.
Example
-<VirtualHost _default_:443>
-SSLProxyEngine on
-...
+
+<VirtualHost _default_:443>
+ SSLProxyEngine on
+ #...
</VirtualHost>
+
@@ -1740,7 +1807,9 @@ there: you also have to create symbolic links named
hash-value.N. And you should always make sure this directory
contains the appropriate symbolic links.
Example
+
SSLProxyCACertificatePath /usr/local/apache2/conf/ssl.crt/
+
@@ -1762,7 +1831,9 @@ concatenation of the various PEM-encoded Certificate files, in order of
preference. This can be used alternatively and/or additionally to
SSLProxyCACertificatePath.
Example
+
SSLProxyCACertificateFile /usr/local/apache2/conf/ssl.crt/ca-bundle-remote-server.crt
+
@@ -1787,7 +1858,9 @@ Additionally you have to create symbolic links named
hash-value.rN. And you should always make sure this directory
contains the appropriate symbolic links.
Example
+
SSLProxyCARevocationPath /usr/local/apache2/conf/ssl.crl/
+
@@ -1810,7 +1883,9 @@ the various PEM-encoded CRL files, in order of preference. This can be
used alternatively and/or additionally to SSLProxyCARevocationPath.
Example
+
SSLProxyCARevocationFile /usr/local/apache2/conf/ssl.crl/ca-bundle-remote-server.crl
+
@@ -1848,7 +1923,9 @@ to succeed - otherwise it will fail with an
Example
+
SSLProxyCARevocationCheck chain
+
@@ -1876,7 +1953,9 @@ any of the SSL environment variables.
href="#ssloptions">SSLOptions).
Example
+
SSLUserName SSL_CLIENT_S_DN_CN
+
@@ -1894,7 +1973,9 @@ SSLUserName SSL_CLIENT_S_DN_CN
the client's preference is used. If this directive is enabled, the
server's preference will be used instead.
Example
+
SSLHonorCipherOrder on
+
@@ -1918,8 +1999,10 @@ separate "-engine" releases of OpenSSL 0.9.6 must be used.
"openssl engine".
Example
-# For a Broadcom accelerator:
+
+# For a Broadcom accelerator:
SSLCryptoDevice ubsec
+
@@ -1945,10 +2028,12 @@ itself, or derived by configuration; see the
directives.
Example
-SSLVerifyClient on
-SSLOCSPEnable on
-SSLOCSPDefaultResponder http://responder.example.com:8888/responder
+
+SSLVerifyClient on
+SSLOCSPEnable on
+SSLOCSPDefaultResponder http://responder.example.com:8888/responder
SSLOCSPOverrideResponder on
+
@@ -2063,7 +2148,9 @@ in CVE-200
Example
+
SSLInsecureRenegotiation on
+
The SSL_SECURE_RENEG environment variable can be used