From: Eric Covener Date: Sat, 17 Sep 2016 13:10:06 +0000 (+0000) Subject: Merge r1761215 from trunk: X-Git-Tag: 2.4.24~245 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=d551568bdf515c1645be5b890a24a4528627f324;p=thirdparty%2Fapache%2Fhttpd.git Merge r1761215 from trunk: feedback in http://httpd.apache.org/docs/2.4/mod/mod_ssl.html#comment_5818 This added paragraph about optional and optional_no_ca isn't helpful. At the TLS layer, the challenge for otpional and required are no different. Move the caution about _no_ca up into where the option is defined and reword. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1761217 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml index 6495ea0d444..596876c0056 100644 --- a/docs/manual/mod/mod_ssl.xml +++ b/docs/manual/mod/mod_ssl.xml @@ -1292,13 +1292,9 @@ The following levels are available for level:

the client has to present a valid Certificate
  • optional_no_ca: the client may present a valid Certificate
    - but it need not to be (successfully) verifiable.
  • + but it need not to be (successfully) verifiable. This option + cannot be relied upon for client authentication. -

    In practice only levels none and -require are really interesting, because level -optional doesn't work with all browsers and level -optional_no_ca is actually against the idea of -authentication (but can be used to establish SSL test pages, etc.)

    Example SSLVerifyClient require