summaryrefslogtreecommitdiffstats
path: root/docs/mod_nss.html
diff options
context:
space:
mode:
authorrcritten <>2005-09-13 19:35:01 +0000
committerrcritten <>2005-09-13 19:35:01 +0000
commit3e58b2e2645ea1beda0c84b364c340b519c62860 (patch)
tree3759fece923138cb68228da78d0b16d321854e5f /docs/mod_nss.html
parent609e2db639062a6eaf66ca0d8275e01fb19fc44b (diff)
downloadmod_nss-3e58b2e2645ea1beda0c84b364c340b519c62860.tar.gz
mod_nss-3e58b2e2645ea1beda0c84b364c340b519c62860.tar.xz
mod_nss-3e58b2e2645ea1beda0c84b364c340b519c62860.zip
Make SSL2 an optional protocol, disabled by default.
Diffstat (limited to 'docs/mod_nss.html')
-rw-r--r--docs/mod_nss.html45
1 files changed, 25 insertions, 20 deletions
diff --git a/docs/mod_nss.html b/docs/mod_nss.html
index 1e34846..350d4fc 100644
--- a/docs/mod_nss.html
+++ b/docs/mod_nss.html
@@ -17,6 +17,7 @@
<a href="#Directives">Configuration Directives</a><br>
<a href="#Environment">Environment Variables</a><br>
<a href="#Database_Management">Database Management</a><br>
+<a href="#SSLv2">Why is SSLv2 disabled?</a><br>
<br>
<h1><a name="Introduction"></a>Introduction</h1>
The <a href="http://www.modssl.org/">mod_ssl</a> package was
@@ -340,7 +341,7 @@ The default value is 86400 (24 hours).<br>
Enables or disables the SSL protocol. This is usually used within a
VirtualHost tag to enable SSL for a particular virtual host.<br>
<span style="font-weight: bold;"><br>
-</span>SSL is disabled by default.<br>
+</span>SSL is disabled by default. <br>
<span style="font-weight: bold;"><br>
Example</span><br style="font-weight: bold;">
<br>
@@ -389,7 +390,8 @@ Example</span><br style="font-weight: bold;">
A space-separated list of the SSL ciphers used, with the prefix <code>+</code>
to enable or <code>-</code> to disable.<br>
<br>
-All ciphers are disabled by default.<br>
+All ciphers are disabled by default. The SSLv2 ciphers cannot be enabled because
+<a href="#SSLv2">SSLv2</a> is not allowed in mod_nss.<br>
<br>
Available ciphers are:<br>
<br>
@@ -567,8 +569,7 @@ definition<br>
<span style="font-weight: bold;">Example</span><br>
<br>
<code>NSSCipherSuite
--des,-desede3,-rc2,-rc2export,-rc4,-rc4export,+rsa_3des_sha,-rsa_des_56_sha,<br>
-+rsa_des_sha,-rsa_null_md5,-rsa_null_sha,-rsa_rc2_40_md5,+rsa_rc4_128_md5,-rsa_rc4_128_sha,<br>
++rsa_3des_sha,-rsa_des_56_sha,+rsa_des_sha,-rsa_null_md5,-rsa_null_sha,-rsa_rc2_40_md5,+rsa_rc4_128_md5,-rsa_rc4_128_sha,<br>
-rsa_rc4_40_md5,-rsa_rc4_56_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-fips_des_sha,<br>
+fips_3des_sha,-rsa_aes_128_sha,-rsa_aes_256_sha</code><br>
<br>
@@ -580,13 +581,13 @@ specifically but allows ciphers for that protocol to be used at all.<br>
<br>
Options are:<br>
<ul>
- <li><code>SSLv2</code></li>
<li><code>SSLv3</code></li>
<li><code>TLSv1</code></li>
<li><code>All</code></li>
</ul>
Note that this differs from mod_ssl in that you can't add or subtract
protocols.<br>
+<a href="#SSLv2">SSLv2</a> is not supported at this time.<br>
<br>
<span style="font-weight: bold;">Example</span><br>
<br>
@@ -607,9 +608,9 @@ be enclosed in double quotes.<br>
<code>NSSNickname Server-Cert</code><br>
<code>NSSNickname "This contains a space"</code><br>
<br>
-<big><big>NSSEnforceValidCerts<br>
+NSSEnforceValidCerts<br>
<br>
-<small><small>By default mod_nss will not start up if the server
+By default mod_nss will not start up if the server
certificate is not valid. This means that if the certificate has
expired or is signed by a CA that is not trusted in the NSS certificate
database the server will not start. If you would like the server to
@@ -620,10 +621,10 @@ not recommended.<br>
<span style="font-weight: bold;">Example</span><br>
<br>
<code>NSSEnforceValidCerts on</code><br>
-</small></small><br>
+<br>
NSSVerifyClient<br>
-<small><small><br>
-</small><small><small><small>Determines whether Client Certificate
+<br>
+Determines whether Client Certificate
Authentication will be requested or required. This may be set in a
per-server or per-directory context. At the server level the
certificate is requested during the initial SSL handshake. In the
@@ -631,25 +632,25 @@ per-directry context an SSL renogitation is required and a certificate
requested from the client.<br>
<br>
Available options are:<br>
-</small></small></small></small></big></big>
+
<ul>
- <li><big><big><small><small><code>none</code>: no client certificate
+ <li><code>none</code>: no client certificate
is required or requested<br>
- </small></small></big></big></li>
- <li><big><big><small><small><code>optional</code>: a client
+ </li>
+ <li>code>optional</code>: a client
certificate is requested but if one is not available, the connection
may continue.<br>
- </small></small></big></big></li>
- <li><big><big><small><small><code>require</code>: a valid client
+ </li>
+ <li><code>require</code>: a valid client
certificate is required for the connection to continue.<br>
- </small></small></big></big></li>
+ </li>
</ul>
-<big><big><small><small><small><small>The mod_ssl option <code>option_no_ca</code>
+The mod_ssl option <code>option_no_ca</code>
is not supported.<br>
<br>
There is no <code>NSSVerifyDepth</code> directive. NSS always verifies
the entire certificate chain.<br>
-</small></small></small></small></big></big><br>
+<br>
<span style="font-weight: bold;">Example</span><br>
<br>
<code>NSSVerifyClient require</code><br>
@@ -1105,7 +1106,11 @@ have NSS validate it:<br>
<br>
<code>% certutil -V -n Server-Cert -u V -d .<br>
certutil: certificate is valid</code><br>
-<br>
+<h1><a name="SSLv2"></a>Why is SSLv2 disabled?</h1>
+All major browsers (Firefox, Internet Explorer, Mozilla, Netscape, Opera, and
+Safari) support SSL 3 and TLS so there is no need for a web server to support
+SSL 2. There are some known attacks against SSL 2 that are handled by
+SSL 3/TLS. SSL2 also doesn't support useful features like client authentication.
<br>
</body>
</html>