<tag>cache_peer</tag>
<p>New option <em>tls-min-version=1.N</em> to set minimum TLS version allowed.
+ <p>New option <em>tls-no-default-ca</em> replaces <em>sslflags=NO_DEFAULT_CA</em>
<p>All <em>ssloptions=</em> values for SSLv2 configuration or disabling
have been removed.
<p>Removed <em>sslversion=</em> option. Use <em>tls-options=</em> instead.
<tag>http_port</tag>
<p>New option <em>tls-min-version=1.N</em> to set minimum TLS version allowed.
+ <p>New option <em>tls-no-default-ca</em> replaces <em>sslflags=NO_DEFAULT_CA</em>
<p>All <em>option=</em> values for SSLv2 configuration or disabling
have been removed.
<p>Removed <em>version=</em> option. Use <em>tls-options=</em> instead.
parameter file name.
<p>Manual squid.conf update may be required on upgrade.
<p>Replaced <em>cafile=</em> with <em>tls-cafile=</em> which takes multiple entries.
+ <p>New option <em>tls-no-default-ca</em> replaces <em>sslflags=NO_DEFAULT_CA</em>
<tag>https_port</tag>
<p>New option <em>tls-min-version=1.N</em> to set minimum TLS version allowed.
+ <p>New option <em>tls-no-default-ca</em> replaces <em>sslflags=NO_DEFAULT_CA</em>
<p>All <em>options=</em> values for SSLv2
configuration or disabling have been removed.
<p>Removed <em>version=</em> option. Use <em>tls-options=</em> instead.
Don't request client certificates
immediately, but wait until acl processing
requires a certificate (not yet implemented).
- NO_DEFAULT_CA
- Don't use the default CA lists built in
- to OpenSSL.
NO_SESSION_REUSE
Don't allow for session reuse. Each connection
will result in a new SSL session.
Verify CRL lists for all certificates in the
client certificate chain.
+ tls-no-default-ca
+ Do not use the system default Trusted CA.
+
sslcontext= SSL session ID context identifier.
Other Options:
Don't request client certificates
immediately, but wait until acl processing
requires a certificate (not yet implemented).
- NO_DEFAULT_CA
- Don't use the default CA lists built in
- to OpenSSL.
NO_SESSION_REUSE
Don't allow for session reuse. Each connection
will result in a new SSL session.
Verify CRL lists for all certificates in the
client certificate chain.
+ tls-no-default-ca
+ Do not use the system default Trusted CA.
+
sslcontext= SSL session ID context identifier.
generate-host-certificates[=<on|off>]
DONT_VERIFY_PEER
Accept certificates even if they fail to
verify.
- NO_DEFAULT_CA
- Don't use the default CA list built in
- to OpenSSL.
DONT_VERIFY_DOMAIN
Don't verify the peer certificate
matches the server name
+ no-default-ca Do not use the system default Trusted CA.
+
domain= The peer name as advertised in its certificate.
Used for verifying the correctness of the received peer
certificate. If not specified the peer hostname will be
Accept certificates even if they fail to
verify.
- NO_DEFAULT_CA
- Don't use the default CA list built in
- to OpenSSL.
-
DONT_VERIFY_DOMAIN
Don't verify the peer certificate
matches the server name
See MS KB document Q307347 for details on this header.
If set to auto the header will only be added if the
request is forwarded as a https:// URL.
-
+
+ tls-no-default-ca
+ Do not use the system default Trusted CA.
==== GENERAL OPTIONS ====
the icap server certificate.
Use to specify intermediate CA certificate(s) if not sent
by the server. Or the full CA chain for the server when
- using the NO_DEFAULT_CA flag.
+ using the tls-no-default-ca flag.
May be repeated to load multiple files.
tls-capath=... A directory containing additional CA certificates to
DONT_VERIFY_PEER
Accept certificates even if they fail to
verify.
- NO_DEFAULT_CA
- Don't use the default CA list built into
- OpenSSL.
DONT_VERIFY_DOMAIN
Don't verify the icap server certificate
matches the server name
+ tls-no-default-ca
+ Do no use the system default Trusted CA.
+
tls-domain= The icap server name as advertised in it's certificate.
Used for verifying the correctness of the received icap
server certificate. If not specified the icap server
sslVersion(p.sslVersion),
encryptTransport(p.encryptTransport)
{
+ memcpy(&flags, &p.flags, sizeof(flags));
}
void
}
if (!found)
fatalf("Unknown TLS flag '" SQUIDSBUFPH "'", SQUIDSBUFPRINT(tok.remaining()));
- fl |= found;
+ if (found == SSL_FLAG_NO_DEFAULT_CA) {
+ debugs(83, DBG_PARSE_NOTE(2), "UPGRADE WARNING: flags=NO_DEFAULT_CA is deprecated. Use tls-no-default-ca instead.");
+ flags.noDefaultCa = true;
+ } else
+ fl |= found;
} while (tok.skipOne(delims));
return fl;
#endif
}
- if ((parsedFlags & SSL_FLAG_NO_DEFAULT_CA))
+ if (flags.noDefaultCa)
return;
#if USE_OPENSSL