📄 mod_ssl.html.en
字号:
<table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Directory of PEM-encoded CA Certificates for Client Auth</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCACertificatePath <em>directory-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive sets the directory where you keep the Certificates ofCertification Authorities (CAs) whose clients you deal with. These are used toverify the client certificate on Client Authentication.</p><p>The files in this directory have to be PEM-encoded and are accessed throughhash filenames. So usually you can't just place the Certificate filesthere: you also have to create symbolic links named<em>hash-value</em><code>.N</code>. And you should always make sure this directorycontains the appropriate symbolic links. Use the <code>Makefile</code> whichcomes with mod_ssl to accomplish this task.</p><div class="example"><h3>Example</h3><p><code>SSLCACertificatePath /usr/local/apache2/conf/ssl.crt/</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCADNRequestFile" id="SSLCADNRequestFile">SSLCADNRequestFile</a> <a name="sslcadnrequestfile" id="sslcadnrequestfile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>File of concatenated PEM-encoded CA Certificates for defining acceptable CA names</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCADNRequestFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>When a client certificate is requested by mod_ssl, a list of<em>acceptable Certificate Authority names</em> is sent to the clientin the SSL handshake. These CA names can be used by the client toselect an appropriate client certificate out of those it hasavailable.</p><p>If neither of the directives <code class="directive"><a href="#sslcadnrequestpath">SSLCADNRequestPath</a></code> or <code class="directive"><a href="#sslcadnrequestfile">SSLCADNRequestFile</a></code> are given, then theset of acceptable CA names sent to the client is the names of all theCA certificates given by the <code class="directive"><a href="#sslcacertificatefile">SSLCACertificateFile</a></code> and <code class="directive"><a href="#sslcacertificatepath">SSLCACertificatePath</a></code> directives; in otherwords, the names of the CAs which will actually be used to verify theclient certificate.</p><p>In some circumstances, it is useful to be able to send a set ofacceptable CA names which differs from the actual CAs used to verifythe client certificate - for example, if the client certificates aresigned by intermediate CAs. In such cases, <code class="directive"><a href="#sslcadnrequestpath">SSLCADNRequestPath</a></code> and/or <code class="directive"><a href="#sslcadnrequestfile">SSLCADNRequestFile</a></code> can be used; theacceptable CA names are then taken from the complete set ofcertificates in the directory and/or file specified by this pair ofdirectives.</p><p><code class="directive"><a href="#sslcadnrequestfile">SSLCADNRequestFile</a></code> mustspecify an <em>all-in-one</em> file containing a concatenation ofPEM-encoded CA certificates.</p><div class="example"><h3>Example</h3><p><code>SSLCADNRequestFile /usr/local/apache2/conf/ca-names.crt</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCADNRequestPath" id="SSLCADNRequestPath">SSLCADNRequestPath</a> <a name="sslcadnrequestpath" id="sslcadnrequestpath">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Directory of PEM-encoded CA Certificates for defining acceptable CA names</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCADNRequestPath <em>directory-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This optional directive can be used to specify the set of<em>acceptable CA names</em> which will be sent to the client when aclient certificate is requested. See the <code class="directive"><a href="#sslcadnrequestfile">SSLCADNRequestFile</a></code> directive for moredetails.</p><p>The files in this directory have to be PEM-encoded and are accessedthrough hash filenames. So usually you can't just place theCertificate files there: you also have to create symbolic links named<em>hash-value</em><code>.N</code>. And you should always make surethis directory contains the appropriate symbolic links. Use the<code>Makefile</code> which comes with mod_ssl to accomplish thistask.</p><div class="example"><h3>Example</h3><p><code>SSLCADNRequestPath /usr/local/apache2/conf/ca-names.crt/</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCARevocationFile" id="SSLCARevocationFile">SSLCARevocationFile</a> <a name="sslcarevocationfile" id="sslcarevocationfile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>File of concatenated PEM-encoded CA CRLs for Client Auth</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCARevocationFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive sets the <em>all-in-one</em> file where you canassemble the Certificate Revocation Lists (CRL) of CertificationAuthorities (CA) whose <em>clients</em> you deal with. These are usedfor Client Authentication. Such a file is simply the concatenation ofthe various PEM-encoded CRL files, in order of preference. This can beused alternatively and/or additionally to <code class="directive"><a href="#sslcarevocationpath">SSLCARevocationPath</a></code>.</p><div class="example"><h3>Example</h3><p><code>SSLCARevocationFile /usr/local/apache2/conf/ssl.crl/ca-bundle-client.crl</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCARevocationPath" id="SSLCARevocationPath">SSLCARevocationPath</a> <a name="sslcarevocationpath" id="sslcarevocationpath">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Directory of PEM-encoded CA CRLs for Client Auth</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCARevocationPath <em>directory-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive sets the directory where you keep the Certificate RevocationLists (CRL) of Certification Authorities (CAs) whose clients you deal with.These are used to revoke the client certificate on Client Authentication.</p><p>The files in this directory have to be PEM-encoded and are accessed throughhash filenames. So usually you have not only to place the CRL files there.Additionally you have to create symbolic links named<em>hash-value</em><code>.rN</code>. And you should always make sure this directorycontains the appropriate symbolic links. Use the <code>Makefile</code> whichcomes with <code class="module"><a href="../mod/mod_ssl.html">mod_ssl</a></code> to accomplish this task.</p><div class="example"><h3>Example</h3><p><code>SSLCARevocationPath /usr/local/apache2/conf/ssl.crl/</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCertificateChainFile" id="SSLCertificateChainFile">SSLCertificateChainFile</a> <a name="sslcertificatechainfile" id="sslcertificatechainfile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>File of PEM-encoded Server CA Certificates</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCertificateChainFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive sets the optional <em>all-in-one</em> file where you canassemble the certificates of Certification Authorities (CA) which form thecertificate chain of the server certificate. This starts with the issuing CAcertificate of of the server certificate and can range up to the root CAcertificate. Such a file is simply the concatenation of the variousPEM-encoded CA Certificate files, usually in certificate chain order.</p><p>This should be used alternatively and/or additionally to <code class="directive"><a href="#sslcacertificatepath">SSLCACertificatePath</a></code> for explicitlyconstructing the server certificate chain which is sent to the browserin addition to the server certificate. It is especially useful toavoid conflicts with CA certificates when using clientauthentication. Because although placing a CA certificate of theserver certificate chain into <code class="directive"><a href="#sslcacertificatepath">SSLCACertificatePath</a></code> has the same effectfor the certificate chain construction, it has the side-effect thatclient certificates issued by this same CA certificate are alsoaccepted on client authentication.</p><p>But be careful: Providing the certificate chain works only if you are using a<em>single</em> RSA <em>or</em> DSA based server certificate. If you areusing a coupled RSA+DSA certificate pair, this will work only if actually bothcertificates use the <em>same</em> certificate chain. Else the browsers will beconfused in this situation.</p><div class="example"><h3>Example</h3><p><code>SSLCertificateChainFile /usr/local/apache2/conf/ssl.crt/ca.crt</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLCertificateFile" id="SSLCertificateFile">SSLCertificateFile</a> <a name="sslcertificatefile" id="sslcertificatefile">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Server PEM-encoded X.509 Certificate file</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLCertificateFile <em>file-path</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive points to the PEM-encoded Certificate file for the server andoptionally also to the corresponding RSA or DSA Private Key file for it(contained in the same file). If the contained Private Key is encrypted thePass Phrase dialog is forced at startup time. This directive can be used up totwo times (referencing different filenames) when both a RSA and a DSA basedserver certificate is used in parallel.</p><div class="example"><h3>Example</h3><p><code>SSLCertificateFile /usr/local/apache2/conf/ssl.crt/server.crt</code></p></div>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -