From 505e42a4b8a735021cbc914b9c08f7aacbeece51 Mon Sep 17 00:00:00 2001 From: rcritten <> Date: Fri, 3 Jun 2005 15:39:54 +0000 Subject: Basic documentation on the mod_nss module. --- docs/mod_nss.html | 908 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 908 insertions(+) create mode 100644 docs/mod_nss.html (limited to 'docs') diff --git a/docs/mod_nss.html b/docs/mod_nss.html new file mode 100644 index 0000000..cffd7f5 --- /dev/null +++ b/docs/mod_nss.html @@ -0,0 +1,908 @@ + + +
+ +| Option + |
+ Description + |
+
| --with-nss=[PATH] + |
+ The file system path to the NSS
+installation. The assumption is that this has the layout of: PATH/lib,
+PATH/include, etc. + |
+
| --with-nspr=[PATH] + |
+ The file system path of the NSPR +installation. The assumption is that this has the layout of: PATH/lib, +PATH/include, etc. | +
| --with-apxs=[PATH] + |
+ The location of the apxs binary
+of the Apache you want to install the module into. + |
+
% ./configure --with-apxs=/path/to/apxs/
+--with-nspr=/path/to/nspr/ --with-nss=/path/to/nss/
+ % gmakenss.conf.
+By default
+this is installed during the installation process.ssl.conf to ssl.conf.old.
+The assumption is that mod_nss is replacing mod_ssl. They can co-exist
+as long as they are listening on separate ports.nss.conf, is copied into
+the Apache
+configuration directory (as reported by apxs). You may need to make a
+manual change to httpd.conf to load this file. If you have a Red
+Hat-style Apache installation with a conf.d just move nss.conf there.
+It will be automatically loaded. Otherwise you will need to add the
+following line to httpd.conf:Include nss.confnss.conf.
+It is here that you will setup your VirtualServer entries to and
+configure your SSL servers.gencert, is included to automatically
+generate a self-signed CA plus one server certificate. This is fine for
+testing purposes but it is strongly recommended that a real server
+certificate be obtained from a real CA before moving a mod_nss server
+into production. Users should be expected to cancel any request to a
+secure server signed by an unknown issuer.gencert takes one argument, the path to the location of
+the certificate database. A fair amount of output is generated so you
+can follow what is going on. For the most part most don't need to
+bother with the details.% ./gencert /etc/httpd/nss
+
+#####################################################################
+Generating new server certificate and key database. The password
+is httptest
+#####################################################################
+
+#####################################################################
+Generating self-signed client CA certificate
+#####################################################################
+
+Generating key. This may take a few moments...
+
+[ Lots of output removed ]/etc/httpd/nss/cert8.db
+/etc/httpd/nss/key3db
+/etc/httpd/nss/secmod.db<IfDefine SSL> so you do not need to use the
+startssl argument with apachectl. % apachectl start
+Please enter password for "internal" token:migrate,pl, is included to help migrate an
+existing mod_ssl configuration to work with mod_nss. There is one
+optional argument, -c, that will try to convert your existing server
+and CA certificates plus any certificate revocation lists (CRLs) into
+an NSS certificate database.SSLPassPhraseDialog builtinSSLPassPhraseHelper /path/to/nss_pcacheSSLCertificateDatabase /etc/httpd/conf/nssSSLSessionCacheSize 10000SSLSessionCacheTimeout 100SSL3SessionCacheTimeout 86400SSLEngine on+
+to enable or - to disable.| Cipher Name + |
+ NSS Cipher
+definition + |
+ Protocol + |
+
| des + |
+ SSL_EN_DES_64_CBC_WITH_MD5 + |
+ SSLv2 | +
| desede3 + |
+ SSL_EN_DES_192_EDE3_CBC_WITH_MD5 + |
+ SSLv2 | +
| rc2 + |
+ SSL_EN_RC2_128_CBC_WITH_MD5 + |
+ SSLv2 | +
| rc2export + |
+ SSL_EN_RC2_128_CBC_EXPORT40_WITH_MD5 + |
+ SSLv2 | +
| rc4 + |
+ SSL_EN_RC4_128_WITH_MD5 + |
+ SSLv2 | +
| rc4export + |
+ SSL_EN_RC4_128_EXPORT40_WITH_MD5 + |
+ SSLv2 | +
| rsa_3des_sha + |
+ SSL_RSA_WITH_3DES_EDE_CBC_SHA + |
+ SSLv3/TLSv1 + |
+
| rsa_des_sha + |
+ SSL_RSA_WITH_DES_CBC_SHA + |
+ SSLv3/TLSv1 | +
| rsa_null_md5 + |
+ SSL_RSA_WITH_NULL_MD5 + |
+ SSLv3/TLSv1 | +
| rsa_null_sha + |
+ SSL_RSA_WITH_NULL_SHA + |
+ SSLv3/TLSv1 | +
| rsa_rc2_40_md5 | +SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5 + |
+ SSLv3/TLSv1 | +
| rsa_rc4_128_md5 | +SSL_RSA_WITH_RC4_128_MD5 + |
+ SSLv3/TLSv1 | +
| rsa_rc4_128_sha | +SSL_RSA_WITH_RC4_128_SHA + |
+ SSLv3/TLSv1 | +
| rsa_rc4_40_md5 | +SSL_RSA_EXPORT_WITH_RC4_40_MD5 + |
+ SSLv3/TLSv1 | +
| fortezza + |
+ SSL_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA + |
+ SSLv3/TLSv1 | +
| fortezza_rc4_128_sha + |
+ SSL_FORTEZZA_DMS_WITH_RC4_128_SHA + |
+ SSLv3/TLSv1 | +
| fortezza_null + |
+ SSL_FORTEZZA_DMS_WITH_NULL_SHA + |
+ SSLv3/TLSv1 | +
| fips_des_sha + |
+ SSL_RSA_FIPS_WITH_DES_CBC_SHA + |
+ SSLv3/TLSv1 | +
| fips_3des_sha + |
+ SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA + |
+ SSLv3/TLSv1 | +
| rsa_des_56_sha | +TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA + |
+ SSL3/TLSv1 | +
| rsa_rc4_56_sha | +TLS_RSA_EXPORT1024_WITH_RC4_56_SHA + |
+ SSLv3/TLSv1 | +
| rsa_aes_128_sha + |
+ TLS_RSA_WITH_AES_128_CBC_SHA + |
+ SSLv3/TLSv1 | +
| rsa_aes_256_sha + |
+ TLS_RSA_WITH_AES_256_CBC_SHA + |
+ SSLv3/TLSv1 | +
SSLCipherSuite
+-des,-desede3,-rc2,-rc2export,-rc4,-rc4export,+rsa_3des_sha,-rsa_des_56_sha,
++rsa_des_sha,-rsa_null_md5,-rsa_null_sha,-rsa_rc2_40_md5,+rsa_rc4_128_md5,-rsa_rc4_128_sha,
+-rsa_rc4_40_md5,-rsa_rc4_56_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-fips_des_sha,
++fips_3des_sha,-rsa_aes_128_sha,-rsa_aes_256_shaSSLv2SSLv3TLSv1AllSSLProtocol SSLv3,TLSv1SSLNickname Server-Certnone: no client certificate
+is required or requestedoptional: a client
+certificate is requested but if one is not available, the connection
+may continue.require: a valid client
+certificate is required for the connection to continue.option_no_ca
+is not supported.SSLVerifyDepth directive. NSS always verifies
+the entire certificate chain.SSLVerifyClient requireSSLUserName SSL_CLIENT_S_DN_UIDSSL_CLIENT_CERT, SSL_CLIENT_CERT_CHAIN[0..n]
+and SSL_SERVER_CERT. This provides additional
+certificate information on the client and server to the environment,
+plus every CA certificate in the client certificate.SSLOptions +FakeBasicAuth
+<Files ~ "\.(cgi|shtml)$">
+SSLOptions +StdEnvVars
+<Files>
+SSLRequireSSL| Name + |
+ Description + |
+
HTTPS+ |
+ Set to "on" if HTTPS is being
+used + |
+
| Name + |
+ Description + |
+
SSL_VERSION_INTERFACE |
+ The version of mod_nss the
+server is running + |
+
SSL_VERSION_LIBRARY |
+ The version of NSS that mod_nss
+was compiled against. + |
+
SSL_PROTOCOL |
+ SSLv2, SSLv3 or TLSv1 + |
+
SSL_CIPHER |
+ The cipher the connection is
+using + |
+
SSL_CIPHER_EXPORT |
+ true if the cipher is an export
+cipher, false otherwise + |
+
SSL_CIPHER_USEKEYSIZE |
+ Number if bits the cipher is
+using + |
+
SSL_CIPHER_ALGKEYSIZE |
+ Max number of bits possible in
+the cipher + |
+
SSL_CLIENT_VERIFY |
+ NONE if no client auth, SUCCESS
+or FAILED if SSLVerifyCert is set + |
+
SSL_CLIENT_V_START |
+ Client certificate validity
+start time + |
+
SSL_CLIENT_V_END |
+ Client certificate validity end +time | +
SSL_CLIENT_M_VERSION |
+ X.509 version of the client
+certificiate + |
+
SSL_CLIENT_M_SERIAL |
+ Serial number of the client
+certificate + |
+
SSL_CLIENT_A_KEY |
+ Algorithm used for client key + |
+
SSL_CLIENT_A_SIG |
+ Algorithm used for the signature +of the client key | +
SSL_CLIENT_S_DN |
+ Distinguished Name (DN) of the +client certificate | +
SSL_CLIENT_S_DN_[C,ST,L,O,OU,CN,T,I,G,S,D,UID,Email] |
+ Components of the client
+certificate. Only those that exist in the certificate are created. + |
+
SSL_CLIENT_I_DN |
+ Distinguished Name (DN) of the
+client certificate issuer + |
+
SSL_CLIENT_I_DN_[C,ST,L,O,OU,CN,T,I,G,S,D,UID,Email] |
+ Components of the client issuer +certificate. Only those that exist in the certificate are created | +
SSL_SERVER_DN |
+ Distinguished Name (DN) of the
+server certificate + |
+
SSL_SERVER_DN_[C,ST,L,O,OU,CN,T,I,G,S,D,UID,Email] |
+ Components of the server +certificate. Only those that exist in the certificate are created | +
SSL_SERVER_I_DN_[C,ST,L,O,OU,CN,T,I,G,S,D,UID,Email] |
+ Components of the server issuer +certificate. Only those that exist in the certificate are created | +
SSL_SERVER_M_VERSION |
+ X.509 version of the server +certificiate | +
SSL_SERVER_M_SERIAL |
+ Serial number of the server +certificate | +
SSL_SERVER_V_START |
+ Server certificate validity +start time | +
SSL_SERVER_V_END |
+ Server certificate validity end +time | +
SSL_SERVER_A_KEY |
+ Algorithm used for server key | +
SSL_SERVER_A_SIG |
+ Algorithm used for the signature +of the server key | +
SSL_SESSION_ID |
+ SSL Session ID + |
+
| Name + |
+ Description + |
+
SSL_SERVER_CERT |
+ The server certificate in PEM
+format. + |
+
SSL_CLIENT_CERT |
+ The client certificate in PEM
+format (if available) + |
+
SSL_CLIENT_CERT_CHAIN_[0..n] |
+ Each certificate in the client
+certificate chain in PEM format (including the client certificate
+itself). + |
+