- Timestamp:
- Jan 25, 2020, 5:04:52 PM (3 years ago)
- Branches:
- asyncio, main, master, proxy-ticket
- Children:
- 47c2384
- Parents:
- f51d359
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/mod_gnutls_manual.md
rf51d359 r8daef10 174 174 does not apply any more and tickets are enabled by default. 175 175 176 ### GnuTLSClientVerify177 178 Enable Client Certificate Verification179 180 GnuTLSClientVerify [ignore|request|require]181 182 Default: `ignore`\183 Context: server config, virtual host, directory, .htaccess184 185 This directive controls the use of TLS Client Certificate186 Authentication. If used in the .htaccess context, it can force TLS187 re-negotiation.188 189 `ignore`190 : `mod_gnutls` will ignore the contents of any TLS Client Certificates191 sent. It will not request that the client sends a certificate.192 193 `request`194 : The client certificate will be requested, but not required.195 The Certificate will be validated if sent. The output of the196 validation status will be stored in the `SSL_CLIENT_VERIFY`197 environment variable and can be `SUCCESS`, `FAILED` or `NONE`.198 199 `require`200 : A Client certificate will be required. Any requests without a valid201 client certificate will be denied. The `SSL_CLIENT_VERIFY`202 environment variable will only be set to `SUCCESS`.203 204 176 ### GnuTLSDHFile 205 177 … … 349 321 running as root, and does not need to be readable by the nobody or 350 322 apache user. 323 324 ### GnuTLSClientVerify 325 326 Enable client certificate verification 327 328 GnuTLSClientVerify [ignore|request|require] 329 330 Default: `ignore`\ 331 Context: server config, virtual host, directory, .htaccess 332 333 This directive controls if clients need to authenticate with a 334 certificate to access resources. If a mode other than `ignore` is used 335 in a directory context the server may request post-handshake 336 authentication (TLS 1.3 only, see below). Trusted CAs for certificate 337 validation are set using [`GnuTLSClientCAFile`](#gnutlsclientcafile). 338 339 `ignore` 340 : `mod_gnutls` will not request certificates from clients, and allow 341 any requests. 342 343 `request` 344 : Client certificates will be requested, but requests are still 345 allowed if the client does not send one or the provided 346 certificate is invalid. If the client authenticates, the 347 certificate validation status will be stored in the 348 [`SSL_CLIENT_VERIFY`](#ssl_client_verify) environment variable and 349 can be `SUCCESS`, `FAILED` or `NONE`. 350 351 `require` 352 : Client certificate authentication will be required for access. If 353 set at server or virtual host level TLS connections from clients 354 without a valid certificate will be denied. If set at directory 355 level any requests without a valid client certificate will be 356 denied with a 403 Forbidden error. The `SSL_CLIENT_VERIFY` 357 environment variable will be set to `SUCCESS` if access is 358 allowed, additional [environment 359 variables](#environment-variables) will hold details on the client 360 certificate. 361 362 When using TLS 1.3 `mod_gnutls` will request [post-handshake 363 authentication](https://tools.ietf.org/html/rfc8446#section-4.6.2) as 364 necessary if the client announced support during the handshake. With 365 TLS versions 1.2 and earlier `mod_gnutls` supports client 366 authentication only during the initial handshake. 367 368 If you want clients that do not support TLS 1.3 at all or do not 369 support the post-handshake authentication extension to have access to 370 resources that require authentication, you can set `GnuTLSClientVerify 371 request` at the server or virtual host level so clients can 372 authenticate during the initial handshake. 351 373 352 374 ### GnuTLSClientCAFile … … 864 886 GnuTLSCertificateFile conf/tls/site3.crt 865 887 GnuTLSKeyFile conf/tls/site3.key 866 GnuTLSClientVerify ignore867 888 GnuTLSSRPPasswdFile conf/tls/tpasswd.site3 868 889 GnuTLSSRPPasswdConfFile conf/tls/tpasswd.site3.conf … … 972 993 reloads. 973 994 995 `SSL_CLIENT_VERIFY` 996 ------------------- 997 998 Verification status of the client's certificate, if any. May be 999 `SUCCESS`, `FAILED` or `NONE`. See 1000 [`GnuTLSClientVerify`](#gnutlsclientverify). 1001 974 1002 `SSL_CLIENT_V_REMAIN` 975 1003 ---------------------
Note: See TracChangeset
for help on using the changeset viewer.