⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 mod_ssl.html.en

📁 Apache官方在今天放出产品系列2.2的最新版本2.2.11的源码包 最流行的HTTP服务器软件之一
💻 EN
📖 第 1 页 / 共 5 页
字号:
               0.9.6, or OpenSSL 0.9.7 or later</td></tr></table><p>This directive enables use of a cryptographic hardware acceleratorboard to offload some of the SSL processing overhead.  This directivecan only be used if the SSL toolkit is built with "engine" support;OpenSSL 0.9.7 and later releases have "engine" support by default, theseparate "-engine" releases of OpenSSL 0.9.6 must be used.</p><p>To discover which engine names are supported, run the command"<code>openssl engine</code>".</p><div class="example"><h3>Example</h3><p><code># For a Broadcom accelerator:<br />SSLCryptoDevice ubsec</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLEngine" id="SSLEngine">SSLEngine</a> <a name="sslengine" id="sslengine">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>SSL Engine Operation Switch</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLEngine on|off|optional</code></td></tr><tr><th><a href="directive-dict.html#Default">Default:</a></th><td><code>SSLEngine off</code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive toggles the usage of the SSL/TLS Protocol Engine. Thisis usually used inside a <code class="directive"><a href="../mod/core.html#virtualhost">&lt;VirtualHost&gt;</a></code> section to enable SSL/TLS for aparticular virtual host. By default the SSL/TLS Protocol Engine isdisabled for both the main server and all configured virtual hosts.</p><div class="example"><h3>Example</h3><p><code>&lt;VirtualHost _default_:443&gt;<br />SSLEngine on<br />...<br />&lt;/VirtualHost&gt;</code></p></div><p>In Apache 2.1 and later, <code class="directive">SSLEngine</code> can be set to <code>optional</code>. This enables support for <a href="http://www.ietf.org/rfc/rfc2817.txt">RFC 2817</a>, Upgrading to TLS Within HTTP/1.1. At this time no web browsers support RFC 2817.</p></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLHonorCipherOrder" id="SSLHonorCipherOrder">SSLHonorCipherOrder</a> <a name="sslhonorcipherorder" id="sslhonorcipherorder">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Option to prefer the server's cipher preference order</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLHonorCiperOrder <em>flag</em></code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr><tr><th><a href="directive-dict.html#Compatibility">Compatibility:</a></th><td>Available in Apache 2.1 and later, if using OpenSSL 0.9.7 or later</td></tr></table><p>When choosing a cipher during an SSLv3 or TLSv1 handshake, normallythe client's preference is used.  If this directive is enabled, theserver's preference will be used instead.</p><div class="example"><h3>Example</h3><p><code>SSLHonorCipherOrder on</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLMutex" id="SSLMutex">SSLMutex</a> <a name="sslmutex" id="sslmutex">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Semaphore for internal mutual exclusion of operations</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLMutex <em>type</em></code></td></tr><tr><th><a href="directive-dict.html#Default">Default:</a></th><td><code>SSLMutex none</code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This configures the SSL engine's semaphore (aka. lock) which is used for mutualexclusion of operations which have to be done in a synchronized way between thepre-forked Apache server processes. This directive can only be used in theglobal server context because it's only useful to have one global mutex.This directive is designed to closely match the<code class="directive"><a href="../mod/mpm_common.html#acceptmutex">AcceptMutex</a></code> directive.</p><p>The following Mutex <em>types</em> are available:</p><ul><li><code>none | no</code>    <p>    This is the default where no Mutex is used at all. Use it at your own    risk. But because currently the Mutex is mainly used for synchronizing    write access to the SSL Session Cache you can live without it as long    as you accept a sometimes garbled Session Cache. So it's not recommended    to leave this the default. Instead configure a real Mutex.</p></li><li><code>posixsem</code>    <p>    This is an elegant Mutex variant where a Posix Semaphore is used when possible.    It is only available when the underlying platform    and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a> supports it.</p></li><li><code>sysvsem</code>    <p>    This is a somewhat elegant Mutex variant where a SystemV IPC Semaphore is used when    possible. It is possible to "leak" SysV semaphores if processes crash before    the semaphore is removed. It is only available when the underlying platform    and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a> supports it.</p></li><li><code>sem</code>    <p>    This directive tells the SSL Module to pick the "best" semaphore implementation    available to it, choosing between Posix and SystemV IPC, in that order. It is only    available when the underlying platform and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a> supports at least one of the 2.</p></li><li><code>pthread</code>    <p>    This directive tells the SSL Module to use Posix thread mutexes. It is only available    if the underlying platform and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a> supports it.</p></li><li><code>fcntl:/path/to/mutex</code>    <p>    This is a portable Mutex variant where a physical (lock-)file and the <code>fcntl()</code>    fucntion are used as the Mutex.    Always use a local disk filesystem for <code>/path/to/mutex</code> and never a file    residing on a NFS- or AFS-filesystem. It is only available when the underlying platform    and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a> supports it. Note: Internally, the Process ID (PID) of the    Apache parent process is automatically appended to    <code>/path/to/mutex</code> to make it unique, so you don't have to worry    about conflicts yourself. Notice that this type of mutex is not available    under the Win32 environment. There you <em>have</em> to use the semaphore    mutex.</p></li><li><code>flock:/path/to/mutex</code>    <p>    This is similar to the <code>fcntl:/path/to/mutex</code> method with the    exception that the <code>flock()</code> function is used to provide file    locking. It is only available when the underlying platform    and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a> supports it.</p></li><li><code>file:/path/to/mutex</code>    <p>    This directive tells the SSL Module to pick the "best" file locking implementation    available to it, choosing between <code>fcntl</code> and <code>flock</code>,    in that order. It is only available when the underlying platform and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a> supports    at least one of the 2.</p></li><li><code>default | yes</code>    <p>    This directive tells the SSL Module to pick the default locking implementation    as determined by the platform and <a class="glossarylink" href="../glossary.html#apr" title="see glossary">APR</a>.</p></li></ul><div class="example"><h3>Example</h3><p><code>SSLMutex file:/usr/local/apache/logs/ssl_mutex</code></p></div></div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div><div class="directive-section"><h2><a name="SSLOptions" id="SSLOptions">SSLOptions</a> <a name="ssloptions" id="ssloptions">Directive</a></h2><table class="directive"><tr><th><a href="directive-dict.html#Description">Description:</a></th><td>Configure various SSL engine run-time options</td></tr><tr><th><a href="directive-dict.html#Syntax">Syntax:</a></th><td><code>SSLOptions [+|-]<em>option</em> ...</code></td></tr><tr><th><a href="directive-dict.html#Context">Context:</a></th><td>server config, virtual host, directory, .htaccess</td></tr><tr><th><a href="directive-dict.html#Override">Override:</a></th><td>Options</td></tr><tr><th><a href="directive-dict.html#Status">Status:</a></th><td>Extension</td></tr><tr><th><a href="directive-dict.html#Module">Module:</a></th><td>mod_ssl</td></tr></table><p>This directive can be used to control various run-time options on aper-directory basis. Normally, if multiple <code>SSLOptions</code>could apply to a directory, then the most specific one is takencompletely; the options are not merged. However if <em>all</em> theoptions on the <code>SSLOptions</code> directive are preceded by aplus (<code>+</code>) or minus (<code>-</code>) symbol, the optionsare merged. Any options preceded by a <code>+</code> are added to theoptions currently in force, and any options preceded by a<code>-</code> are removed from the options currently in force.</p><p>The available <em>option</em>s are:</p><ul><li><code>StdEnvVars</code>    <p>    When this option is enabled, the standard set of SSL related CGI/SSI    environment variables are created. This per default is disabled for    performance reasons, because the information extraction step is a    rather expensive operation. So one usually enables this option for    CGI and SSI requests only.</p></li><li><code>CompatEnvVars</code>    <p>    When this option is enabled, additional CGI/SSI environment variables are    created for backward compatibility to other Apache SSL solutions. Look in    the <a href="../ssl/ssl_compat.html">Compatibility</a> chapter for details    on the particular variables generated.</p></li><li><code>ExportCertData</code>    <p>    When this option is enabled, additional CGI/SSI environment variables are    created: <code>SSL_SERVER_CERT</code>, <code>SSL_CLIENT_CERT</code> and    <code>SSL_CLIENT_CERT_CHAIN_</code><em>n</em> (with <em>n</em> = 0,1,2,..).    These contain the PEM-encoded X.509 Certificates of server and client for    the current HTTPS connection and can be used by CGI scripts for deeper    Certificate checking. Additionally all other certificates of the client    certificate chain are provided, too. This bloats up the environment a    little bit which is why you have to use this option to enable it on    demand.</p></li><li><code>FakeBasicAuth</code>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -