- Timestamp:
- Jun 20, 2016, 3:23:21 PM (7 years ago)
- Branches:
- asyncio, debian/master, debian/stretch-backports, main, master, proxy-ticket, upstream
- Children:
- 9c456a9
- Parents:
- c3c96ca
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/mod_gnutls_manual.mdwn
rc3c96ca rdf49a2d 53 53 ======================== 54 54 55 `GnuTLSEnable` 56 -------------- 55 General Options 56 --------------- 57 58 ### GnuTLSEnable 57 59 58 60 Enable GnuTLS for this virtual host … … 65 67 This directive enables SSL/TLS Encryption for a Virtual Host. 66 68 67 `GnuTLSCache` 68 ------------- 69 ### GnuTLSCache 69 70 70 71 Configure TLS Session Cache … … 108 109 requires no configuration. 109 110 110 `GnuTLSCacheTimeout` 111 -------------------- 111 ### GnuTLSCacheTimeout 112 112 113 113 Timeout for TLS Session Cache expiration … … 122 122 expiration time of the ticket in seconds. 123 123 124 `GnuTLSSessionTickets` 125 ---------------------- 124 ### GnuTLSSessionTickets 126 125 127 126 Enable Session Tickets for the server … … 147 146 attacker gains access to server memory. 148 147 149 `GnuTLSCertificateFile` 150 ----------------------- 151 152 Set to the PEM Encoded Server Certificate 153 154 GnuTLSCertificateFile FILEPATH 155 156 Default: *none*\ 157 Context: server config, virtual host 158 159 Takes an absolute or relative path to a PEM-encoded X.509 certificate to 160 use as this Server's End Entity (EE) certificate. If you need to supply 161 certificates for intermediate Certificate Authorities (iCAs), they 162 should be listed in sequence in the file, from EE to the iCA closest to 163 the root CA. Optionally, you can also include the root CA's certificate 164 as the last certificate in the list. 165 166 Since version 0.7 this can be a PKCS #11 URL. 167 168 `GnuTLSKeyFile` 169 --------------- 170 171 Set to the PEM Encoded Server Private Key 172 173 GnuTLSKeyFile FILEPATH 174 175 Default: *none*\ 176 Context: server config, virtual host 177 178 Takes an absolute or relative path to the Server Private Key. Set 179 `GnuTLSPIN` if the key file is encrypted. 180 181 Since version 0.7 this can be a PKCS #11 URL. 182 183 **Security Warning:**\ 184 This private key must be protected. It is read while Apache is still 185 running as root, and does not need to be readable by the nobody or 186 apache user. 187 188 `GnuTLSPGPCertificateFile` 189 -------------------------- 190 191 Set to a base64 Encoded Server OpenPGP Certificate 192 193 GnuTLSPGPCertificateFile FILEPATH 194 195 Default: *none*\ 196 Context: server config, virtual host 197 198 Takes an absolute or relative path to a base64 Encoded OpenPGP 199 Certificate to use as this Server's Certificate. 200 201 `GnuTLSPGPKeyFile` 202 ------------------ 203 204 Set to the Server OpenPGP Secret Key 205 206 GnuTLSPGPKeyFile FILEPATH 207 208 Default: *none*\ 209 Context: server config, virtual host 210 211 Takes an absolute or relative path to the Server Private Key. This key 212 cannot currently be password protected. 213 214 **Security Warning:**\ 215 This private key must be protected. It is read while Apache is still 216 running as root, and does not need to be readable by the nobody or 217 apache user. 218 219 `GnuTLSClientVerify` 220 -------------------- 221 222 Enable Client Certificate Verification\ 148 ### GnuTLSClientVerify 149 150 Enable Client Certificate Verification 223 151 224 152 GnuTLSClientVerify [ignore|request|require] … … 246 174 environment variable will only be set to `SUCCESS`. 247 175 248 `GnuTLSClientCAFile` 249 -------------------- 250 251 Set to the PEM Encoded Certificate Authority Certificate 252 253 GnuTLSClientCAFile FILEPATH 254 255 Default: *none* 256 Context: server config, virtual host 257 258 Takes an absolute or relative path to a PEM Encoded Certificate to use 259 as a Certificate Authority with Client Certificate Authentication. 260 This file may contain a list of trusted authorities. 261 262 `GnuTLSPGPKeyringFile` 263 ---------------------- 264 265 Set to a base64 Encoded key ring 266 267 GnuTLSPGPKeyringFile FILEPATH 268 269 Default: *none*\ 270 Context: server config, virtual host 271 272 Takes an absolute or relative path to a base64 Encoded Certificate 273 list (key ring) to use as a means of verification of Client 274 Certificates. This file should contain a list of trusted signers. 275 276 `GnuTLSDHFile` 277 -------------- 176 ### GnuTLSDHFile 278 177 279 178 Set to the PKCS \#3 encoded Diffie Hellman parameters … … 289 188 2048`. If not set `mod_gnutls` will use the included parameters. 290 189 291 `GnuTLSSRPPasswdFile` 292 --------------------- 293 294 Set to the SRP password file for SRP ciphersuites 295 296 GnuTLSSRPPasswdFile FILEPATH 297 298 Default: *none*\ 299 Context: server config, virtual host 300 301 Takes an absolute or relative path to an SRP password file. This is 302 the same format as used in libsrp. You can generate such file using 303 the command `srptool --passwd /etc/tpasswd --passwd-conf 304 /etc/tpasswd.conf -u test` to set a password for user test. This 305 password file holds the username, a password verifier and the 306 dependency to the SRP parameters. 307 308 `GnuTLSSRPPasswdConfFile` 309 ------------------------- 310 311 Set to the SRP password.conf file for SRP ciphersuites 312 313 GnuTLSSRPPasswdConfFile FILEPATH 314 315 Default: *none*\ 316 Context: server config, virtual host 317 318 Takes an absolute or relative path to an SRP password.conf file. This 319 is the same format as used in `libsrp`. You can generate such file 320 using the command `srptool --create-conf /etc/tpasswd.conf`. This 321 file holds the SRP parameters and is associate with the password file 322 (the verifiers depends on these parameters). 323 324 `GnuTLSPriorities` 325 ------------------ 190 ### GnuTLSPriorities 326 191 327 192 Set the allowed protocol versions, ciphers, key exchange algorithms, … … 366 231 running `gnutls-cli --list`. 367 232 368 `GnuTLSP11Module` 369 ------------------ 233 ### GnuTLSP11Module 370 234 371 235 Load this PKCS #11 module. … … 379 243 defaults. May occur multiple times to load multiple modules. 380 244 381 `GnuTLSPIN` 382 ------------------ 245 ### GnuTLSPIN 383 246 384 247 Set the PIN to be used to access encrypted key files or PKCS #11 objects. … … 393 256 or openssl encrypted keys. 394 257 395 `GnuTLSSRKPIN` 396 ------------------ 397 398 Set the SRK PIN to be used to unlaccess the TPM. 258 ### GnuTLSSRKPIN 259 260 Set the SRK PIN to be used to access the TPM. 399 261 400 262 GnuTLSSRKPIN XXXXXX … … 406 268 the TPM module. 407 269 408 `GnuTLSExportCertificates` 409 -------------------------- 270 ### GnuTLSExportCertificates 410 271 411 272 Export the PEM encoded certificates to CGIs … … 434 295 environment variables to the CGI process as `mod_ssl`. 435 296 436 437 `GnuTLSProxyEngine` 438 -------------- 297 X.509 Certificate Authentication 298 -------------------------------- 299 300 ### GnuTLSCertificateFile 301 302 Set to the PEM Encoded Server Certificate 303 304 GnuTLSCertificateFile FILEPATH 305 306 Default: *none*\ 307 Context: server config, virtual host 308 309 Takes an absolute or relative path to a PEM-encoded X.509 certificate to 310 use as this Server's End Entity (EE) certificate. If you need to supply 311 certificates for intermediate Certificate Authorities (iCAs), they 312 should be listed in sequence in the file, from EE to the iCA closest to 313 the root CA. Optionally, you can also include the root CA's certificate 314 as the last certificate in the list. 315 316 Since version 0.7 this can be a PKCS #11 URL. 317 318 ### GnuTLSKeyFile 319 320 Set to the PEM Encoded Server Private Key 321 322 GnuTLSKeyFile FILEPATH 323 324 Default: *none*\ 325 Context: server config, virtual host 326 327 Takes an absolute or relative path to the Server Private Key. Set 328 `GnuTLSPIN` if the key file is encrypted. 329 330 Since version 0.7 this can be a PKCS #11 URL. 331 332 **Security Warning:**\ 333 This private key must be protected. It is read while Apache is still 334 running as root, and does not need to be readable by the nobody or 335 apache user. 336 337 ### GnuTLSClientCAFile 338 339 Set the PEM encoded Certificate Authority list to use for X.509 base 340 client authentication 341 342 GnuTLSClientCAFile FILEPATH 343 344 Default: *none* 345 Context: server config, virtual host 346 347 Takes an absolute or relative path to a PEM Encoded Certificate to use 348 as a Certificate Authority with Client Certificate Authentication. 349 This file may contain a list of trusted authorities. 350 351 OpenPGP Certificate Authentication 352 ---------------------------------- 353 354 ### GnuTLSPGPCertificateFile 355 356 Set to a base64 Encoded Server OpenPGP Certificate 357 358 GnuTLSPGPCertificateFile FILEPATH 359 360 Default: *none*\ 361 Context: server config, virtual host 362 363 Takes an absolute or relative path to a base64 Encoded OpenPGP 364 Certificate to use as this Server's Certificate. 365 366 ### GnuTLSPGPKeyFile 367 368 Set to the Server OpenPGP Secret Key 369 370 GnuTLSPGPKeyFile FILEPATH 371 372 Default: *none*\ 373 Context: server config, virtual host 374 375 Takes an absolute or relative path to the Server Private Key. This key 376 cannot currently be password protected. 377 378 **Security Warning:**\ 379 This private key must be protected. It is read while Apache is still 380 running as root, and does not need to be readable by the nobody or 381 apache user. 382 383 ### GnuTLSPGPKeyringFile 384 385 Set to a base64 Encoded key ring 386 387 GnuTLSPGPKeyringFile FILEPATH 388 389 Default: *none*\ 390 Context: server config, virtual host 391 392 Takes an absolute or relative path to a base64 Encoded Certificate 393 list (key ring) to use as a means of verification of Client 394 Certificates. This file should contain a list of trusted signers. 395 396 SRP Authentication 397 ------------------ 398 399 ### GnuTLSSRPPasswdFile 400 401 Set to the SRP password file for SRP ciphersuites 402 403 GnuTLSSRPPasswdFile FILEPATH 404 405 Default: *none*\ 406 Context: server config, virtual host 407 408 Takes an absolute or relative path to an SRP password file. This is 409 the same format as used in libsrp. You can generate such file using 410 the command `srptool --passwd /etc/tpasswd --passwd-conf 411 /etc/tpasswd.conf -u test` to set a password for user test. This 412 password file holds the username, a password verifier and the 413 dependency to the SRP parameters. 414 415 ### GnuTLSSRPPasswdConfFile 416 417 Set to the SRP password.conf file for SRP ciphersuites 418 419 GnuTLSSRPPasswdConfFile FILEPATH 420 421 Default: *none*\ 422 Context: server config, virtual host 423 424 Takes an absolute or relative path to an SRP password.conf file. This 425 is the same format as used in `libsrp`. You can generate such file 426 using the command `srptool --create-conf /etc/tpasswd.conf`. This 427 file holds the SRP parameters and is associate with the password file 428 (the verifiers depends on these parameters). 429 430 TLS Proxy Configuration 431 ----------------------- 432 433 ### GnuTLSProxyEngine 439 434 440 435 Enable TLS proxy connections for this virtual host … … 448 443 host. 449 444 450 `GnuTLSProxyCAFile` 451 -------------------- 445 ### GnuTLSProxyCAFile 452 446 453 447 Set to the PEM encoded Certificate Authority Certificate … … 464 458 always fail due to lack of a trusted CA. 465 459 466 `GnuTLSProxyCRLFile` 467 -------------------- 460 ### GnuTLSProxyCRLFile 468 461 469 462 Set to the PEM encoded Certificate Revocation List … … 478 471 back end servers. The file may contain a list of CRLs. 479 472 480 `GnuTLSProxyCertificateFile` 481 ----------------------- 473 ### GnuTLSProxyCertificateFile 482 474 483 475 Set to the PEM encoded Client Certificate … … 500 492 provide the matching private key. 501 493 502 `GnuTLSProxyKeyFile` 503 --------------- 494 ### GnuTLSProxyKeyFile 504 495 505 496 Set to the PEM encoded Private Key … … 519 510 apache user. 520 511 521 `GnuTLSProxyPriorities` 522 ------------------ 512 ### GnuTLSProxyPriorities 523 513 524 514 Set the allowed ciphers, key exchange algorithms, MACs and compression … … 535 525 `GnuTLSProxyEngine` is `On`. 536 526 537 `GnuTLSOCSPStapling` 538 ------------------ 527 OCSP Stapling Configuration 528 --------------------------- 529 530 ### GnuTLSOCSPStapling 539 531 540 532 EXPERIMENTAL: Enable OCSP stapling for this (virtual) host. … … 562 554 OCSP cache updates are serialized using the `gnutls-ocsp` mutex. 563 555 564 `GnuTLSOCSPResponseFile` 565 ------------------ 556 ### GnuTLSOCSPResponseFile 566 557 567 558 EXPERIMENTAL: Read the OCSP response for stapling from this file … … 582 573 * Testing 583 574 584 `GnuTLSOCSPGraceTime` 585 ------------------ 575 ### GnuTLSOCSPGraceTime 586 576 587 577 EXPERIMENTAL: Replace cached OCSP responses this many seconds before
Note: See TracChangeset
for help on using the changeset viewer.