📄 mod_ssl.html.en
字号:
contains the appropriate symbolic links. Use the <code>Makefile</code> whichcomes with mod_ssl to accomplish this task.</p><div class="example"><h3>Example</h3><p><code>SSLCACertificatePath /usr/local/apache2/conf/ssl.crt/</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCARevocationFile" id="SSLCARevocationFile">SSLCARevocationFile</a> <a name="sslcarevocationfile" id="sslcarevocationfile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>File of concatenated PEM-encoded CA CRLs for Client Auth</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCARevocationFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive sets the <em>all-in-one</em> file where you canassemble the Certificate Revocation Lists (CRL) of CertificationAuthorities (CA) whose <em>clients</em> you deal with. These are usedfor Client Authentication. Such a file is simply the concatenation ofthe various PEM-encoded CRL files, in order of preference. This can beused alternatively and/or additionally to <code class="directive"><a href="#sslcarevocationpath">SSLCARevocationPath</a></code>.</p><div class="example"><h3>Example</h3><p><code>SSLCARevocationFile /usr/local/apache2/conf/ssl.crl/ca-bundle-client.crl</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCARevocationPath" id="SSLCARevocationPath">SSLCARevocationPath</a> <a name="sslcarevocationpath" id="sslcarevocationpath">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Directory of PEM-encoded CA CRLs for Client Auth</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCARevocationPath <em>directory-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive sets the directory where you keep the Certificate RevocationLists (CRL) of Certification Authorities (CAs) whose clients you deal with.These are used to revoke the client certificate on Client Authentication.</p><p>The files in this directory have to be PEM-encoded and are accessed throughhash filenames. So usually you have not only to place the CRL files there.Additionally you have to create symbolic links named<em>hash-value</em><code>.rN</code>. And you should always make sure this directorycontains the appropriate symbolic links. Use the <code>Makefile</code> whichcomes with <code class="module"><a href="../mod/mod_ssl.html">mod_ssl</a></code> to accomplish this task.</p><div class="example"><h3>Example</h3><p><code>SSLCARevocationPath /usr/local/apache2/conf/ssl.crl/</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCertificateChainFile" id="SSLCertificateChainFile">SSLCertificateChainFile</a> <a name="sslcertificatechainfile" id="sslcertificatechainfile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>File of PEM-encoded Server CA Certificates</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCertificateChainFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive sets the optional <em>all-in-one</em> file where you canassemble the certificates of Certification Authorities (CA) which form thecertificate chain of the server certificate. This starts with the issuing CAcertificate of of the server certificate and can range up to the root CAcertificate. Such a file is simply the concatenation of the variousPEM-encoded CA Certificate files, usually in certificate chain order.</p><p>This should be used alternatively and/or additionally to <code class="directive"><a href="#sslcacertificatepath">SSLCACertificatePath</a></code> for explicitlyconstructing the server certificate chain which is sent to the browserin addition to the server certificate. It is especially useful toavoid conflicts with CA certificates when using clientauthentication. Because although placing a CA certificate of theserver certificate chain into <code class="directive"><a href="#sslcacertificatepath">SSLCACertificatePath</a></code> has the same effectfor the certificate chain construction, it has the side-effect thatclient certificates issued by this same CA certificate are alsoaccepted on client authentication. That's usually not one expect.</p><p>But be careful: Providing the certificate chain works only if you are using a<em>single</em> (either RSA <em>or</em> DSA) based server certificate. If you areusing a coupled RSA+DSA certificate pair, this will work only if actually bothcertificates use the <em>same</em> certificate chain. Else the browsers will beconfused in this situation.</p><div class="example"><h3>Example</h3><p><code>SSLCertificateChainFile /usr/local/apache2/conf/ssl.crt/ca.crt</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCertificateFile" id="SSLCertificateFile">SSLCertificateFile</a> <a name="sslcertificatefile" id="sslcertificatefile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Server PEM-encoded X.509 Certificate file</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCertificateFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive points to the PEM-encoded Certificate file for the server andoptionally also to the corresponding RSA or DSA Private Key file for it(contained in the same file). If the contained Private Key is encrypted thePass Phrase dialog is forced at startup time. This directive can be used up totwo times (referencing different filenames) when both a RSA and a DSA basedserver certificate is used in parallel.</p><div class="example"><h3>Example</h3><p><code>SSLCertificateFile /usr/local/apache2/conf/ssl.crt/server.crt</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCertificateKeyFile" id="SSLCertificateKeyFile">SSLCertificateKeyFile</a> <a name="sslcertificatekeyfile" id="sslcertificatekeyfile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Server PEM-encoded Private Key file</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCertificateKeyFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive points to the PEM-encoded Private Key file for theserver. If the Private Key is not combined with the Certificate in the<code class="directive">SSLCertificateFile</code>, use this additional directive topoint to the file with the stand-alone Private Key. When<code class="directive">SSLCertificateFile</code> is used and the filecontains both the Certificate and the Private Key this directive neednot be used. But we strongly discourage this practice. Instead werecommend you to separate the Certificate and the Private Key. If thecontained Private Key is encrypted, the Pass Phrase dialog is forcedat startup time. This directive can be used up to two times(referencing different filenames) when both a RSA and a DSA basedprivate key is used in parallel.</p><div class="example"><h3>Example</h3><p><code>SSLCertificateKeyFile /usr/local/apache2/conf/ssl.key/server.key</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCipherSuite" id="SSLCipherSuite">SSLCipherSuite</a> <a name="sslciphersuite" id="sslciphersuite">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Cipher Suite available for negotiation in SSL handshake</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCipherSuite <em>cipher-spec</em></code></td></tr><tr><th><a href="directive-dict.html#Default">Default:</a></th><td><code>SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP</code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host, directory, .htaccess</td></tr><tr><th><a href="directive-dict.html#Override">Override:</a></th><td>AuthConfig</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This complex directive uses a colon-separated <em>cipher-spec</em> stringconsisting of OpenSSL cipher specifications to configure the Cipher Suite theclient is permitted to negotiate in the SSL handshake phase. Notice that thisdirective can be used both in per-server and per-directory context. Inper-server context it applies to the standard SSL handshake when a connectionis established. In per-directory context it forces a SSL renegotation with thereconfigured Cipher Suite after the HTTP request was read but before the HTTPresponse is sent.</p><p>An SSL cipher specification in <em>cipher-spec</em> is composed of 4 majorattributes plus a few extra minor ones:</p><ul><li><em>Key Exchange Algorithm</em>:<br /> RSA or Diffie-Hellman variants.</li><li><em>Authentication Algorithm</em>:<br /> RSA, Diffie-Hellman, DSS or none.</li><li><em>Cipher/Encryption Algorithm</em>:<br /> DES, Triple-DES, RC4, RC2, IDEA or none.</li><li><em>MAC Digest Algorithm</em>:<br /> MD5, SHA or SHA1.</li></ul><p>An SSL cipher can also be an export cipher and is either a SSLv2 or SSLv3/TLSv1cipher (here TLSv1 is equivalent to SSLv3). To specify which ciphers to use,one can either specify all the Ciphers, one at a time, or use aliases tospecify the preference and order for the ciphers (see <a href="#table1">Table1</a>).</p><table class="bordered"><tr><th><a name="table1">Tag</a></th> <th>Description</th></tr><tr><td colspan="2"><em>Key Exchange Algorithm:</em></td></tr><tr><td><code>kRSA</code></td> <td>RSA key exchange</td></tr><tr><td><code>kDHr</code></td> <td>Diffie-Hellman key exchange with RSA key</td></tr><tr><td><code>kDHd</code></td> <td>Diffie-Hellman key exchange with DSA key</td></tr><tr><td><code>kEDH</code></td> <td>Ephemeral (temp.key) Diffie-Hellman key exchange (no cert)</td> </tr><tr><td colspan="2"><em>Authentication Algorithm:</em></td></tr><tr><td><code>aNULL</code></td> <td>No authentication</td></tr><tr><td><code>aRSA</code></td> <td>RSA authentication</td></tr><tr><td><code>aDSS</code></td> <td>DSS authentication</td> </tr><tr><td><code>aDH</code></td> <td>Diffie-Hellman authentication</td></tr><tr><td colspan="2"><em>Cipher Encoding Algorithm:</em></td></tr>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -