From: Eric Covener Date: Fri, 5 Nov 2010 19:38:42 +0000 (+0000) Subject: PR#48720: SSLProxyVerify is per-server, not per-directory. X-Git-Tag: 2.2.18~313 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=f7d75224ef83d2b97adb347002dd8ed3541a35ce;p=thirdparty%2Fapache%2Fhttpd.git PR#48720: SSLProxyVerify is per-server, not per-directory. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@1031745 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_ssl.html.en b/docs/manual/mod/mod_ssl.html.en index 7e9992e3ea2..23178372ba8 100644 --- a/docs/manual/mod/mod_ssl.html.en +++ b/docs/manual/mod/mod_ssl.html.en @@ -1287,21 +1287,14 @@ for additional information. Description:Type of remote server Certificate verification Syntax:SSLProxyVerify level Default:SSLProxyVerify none -Context:server config, virtual host, directory, .htaccess -Override:AuthConfig +Context:server config, virtual host Status:Extension Module:mod_ssl

When a proxy is configured to forward requests to a remote SSL server, this directive can be used to configure certificate -verification of the remote server. Notice that this directive can be -used both in per-server and per-directory context. In per-server -context it applies to the remote server authentication process used in -the standard SSL handshake when a connection is established by the -proxy. In per-directory context it forces a SSL renegotation with the -reconfigured remote server verification level after the HTTP request -was read but before the HTTP response is sent.

+verification of the remote server.

Note that even when certificate verification is enabled, @@ -1350,19 +1343,14 @@ SSLProxyVerify require Certificate verification Syntax:SSLProxyVerifyDepth number Default:SSLProxyVerifyDepth 1 -Context:server config, virtual host, directory, .htaccess +Context:server config, virtual host Override:AuthConfig Status:Extension Module:mod_ssl

This directive sets how deeply mod_ssl should verify before deciding that the -remote server does not have a valid certificate. Notice that this directive can be -used both in per-server and per-directory context. In per-server context it -applies to the client authentication process used in the standard SSL -handshake when a connection is established. In per-directory context it forces -a SSL renegotation with the reconfigured remote server verification depth after the -HTTP request was read but before the HTTP response is sent.

+remote server does not have a valid certificate.

The depth actually is the maximum number of intermediate certificate issuers, i.e. the number of CA certificates which are max allowed to be followed while diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml index 2862637ee31..a43e5aefd2b 100644 --- a/docs/manual/mod/mod_ssl.xml +++ b/docs/manual/mod/mod_ssl.xml @@ -1467,22 +1467,12 @@ SSLProxyMachineCertificateFile /usr/local/apache2/conf/ssl.crt/proxy.pem SSLProxyVerify level SSLProxyVerify none server config -virtual host -directory -.htaccess -AuthConfig - +virtual host

When a proxy is configured to forward requests to a remote SSL server, this directive can be used to configure certificate -verification of the remote server. Notice that this directive can be -used both in per-server and per-directory context. In per-server -context it applies to the remote server authentication process used in -the standard SSL handshake when a connection is established by the -proxy. In per-directory context it forces a SSL renegotation with the -reconfigured remote server verification level after the HTTP request -was read but before the HTTP response is sent.

+verification of the remote server.

Note that even when certificate verification is enabled, @@ -1532,20 +1522,13 @@ Certificate verification SSLProxyVerifyDepth number SSLProxyVerifyDepth 1 server config -virtual host -directory -.htaccess +virtual host AuthConfig

This directive sets how deeply mod_ssl should verify before deciding that the -remote server does not have a valid certificate. Notice that this directive can be -used both in per-server and per-directory context. In per-server context it -applies to the client authentication process used in the standard SSL -handshake when a connection is established. In per-directory context it forces -a SSL renegotation with the reconfigured remote server verification depth after the -HTTP request was read but before the HTTP response is sent.

+remote server does not have a valid certificate.

The depth actually is the maximum number of intermediate certificate issuers, i.e. the number of CA certificates which are max allowed to be followed while