- Timestamp:
- Jun 20, 2016, 2:50:50 PM (7 years ago)
- Branches:
- asyncio, debian/master, debian/stretch-backports, main, master, proxy-ticket, upstream
- Children:
- e9ef72c
- Parents:
- 4c529de
- git-author:
- Thomas Klute <thomas2.klute@…> (06/20/16 12:31:13)
- git-committer:
- Thomas Klute <thomas2.klute@…> (06/20/16 14:50:50)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/mod_gnutls_manual.mdwn
r4c529de r5a5032f 546 546 takes the same parameters as `GnuTLSPriorities`. Required if 547 547 `GnuTLSProxyEngine` is `On`. 548 549 `GnuTLSOCSPStapling` 550 ------------------ 551 552 EXPERIMENTAL: Enable OCSP stapling for this (virtual) host. 553 554 GnuTLSOCSPStapling [On|Off] 555 556 Default: *off*\ 557 Context: server config, virtual host 558 559 OCSP stapling, formally known as the TLS Certificate Status Request 560 extension, allows the server to provide the client with an OCSP 561 response for its certificate during the handshake. This way the client 562 does not have to send an OCSP request to the CA to check the 563 certificate status, which offers privacy and performance advantages. 564 565 Using OCSP stapling has a few requirements: 566 567 * Caching OCSP responses requires a cache, so `GnuTLSCache` must not 568 be `none`. 569 * `GnuTLSCertificateFile` must contain the issuer CA certificate in 570 addition to the server certificate so responses can be verified. 571 * The certificate must either contain an OCSP access URI using HTTP, 572 or `GnuTLSOCSPResponseFile` must be set. 573 574 OCSP cache updates are serialized using the `gnutls-ocsp` mutex. 575 576 `GnuTLSOCSPResponseFile` 577 ------------------ 578 579 EXPERIMENTAL: Read the OCSP response for stapling from this file 580 instead of sending a request over HTTP 581 582 GnuTLSOCSPResponseFile /path/to/response.der 583 584 Default: *empty*\ 585 Context: server config, virtual host 586 587 The response file must be updated externally, for example using a cron 588 job. This option is an alternative to the server fetching OCSP 589 responses over HTTP. Reasons to use this option include: 590 591 * Performing OCSP requests separate from the web server, to prevent slow 592 responses from stalling handshakes. 593 * The issuer CA uses an access method other than HTTP. 594 * Testing 595 596 `GnuTLSOCSPGraceTime` 597 ------------------ 598 599 EXPERIMENTAL: Replace cached OCSP responses this many seconds before 600 they expire. 601 602 GnuTLSOCSPGraceTime SECONDS 603 604 Default: *60*\ 605 Context: server config, virtual host 606 607 A cached OCSP response should be updated a little before it expires to 608 account for potential clock skew between server, CA, and client, as 609 well as transmission time in corner cases. 548 610 549 611 * * * * *
Note: See TracChangeset
for help on using the changeset viewer.