the client if any are supplied (otherwise it will use the
canonical name, as defined above). These values are the same
that are used to implement <a
- href="../vhosts/name-based.html">name based virtual hosts</a>,
+ href="../vhosts/name-based.html">name-based virtual hosts</a>,
and are available with the same clients. The CGI variables
<code>SERVER_NAME</code> and <code>SERVER_PORT</code> will be
constructed from the client supplied values as well.</p>
<p>To solve this problem the <directive module="mod_cache">CacheQuickHandler
</directive> directive can be set to <strong>off</strong>, and the server will
- process all phases normally handled by a non cached request, including the
+ process all phases normally handled by a non-cached request, including the
<strong>authentication and authorisation</strong> phases.</p>
<p>In addition, the administrator may optionally specify the <strong>precise point
of the cookie.</p>
<note type="warning"><title>Warning</title>
- <p>Some of the HTTP cookie privacy features are either non standard, or
+ <p>Some of the HTTP cookie privacy features are either non-standard, or
are not implemented consistently across browsers. The session modules
allow you to set cookie parameters, but it makes no guarantee that privacy
will be respected by the browser. If security is a concern, use the
<directivesynopsis>
<name>SSLStrictSNIVHostCheck</name>
-<description>Whether to allow non SNI clients to access a name based virtual
+<description>Whether to allow non-SNI clients to access a name-based virtual
host.
</description>
<syntax>SSLStrictSNIVHostCheck on|off</syntax>
<usage>
<p>
-This directive sets whether a non SNI client is allowed to access a name based
-virtual host. If set to <code>on</code> in the default name based virtual
+This directive sets whether a non-SNI client is allowed to access a name-based
+virtual host. If set to <code>on</code> in the default name-based virtual
host, clients that are SNI unaware will not be allowed to access <em>any</em>
virtual host, belonging to this particular IP / port combination.
If set to <code>on</code> in any other virtual host, SNI unaware clients
MSIE 5.x has an error in the way it handles the SGC negotiation.</p>
<p>And finally there are versions of MSIE which seem to require that
- an SSL session can be reused (a totally non standard-conforming
+ an SSL session can be reused (a totally non-standard-conforming
behaviour, of course). Connecting with those MSIE versions only work
if a SSL session cache is used. So, as a work-around, make sure you
are using a session cache (see the <directive module="mod_ssl"