-.\" XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
-.\" DO NOT EDIT! Generated from XML source.
-.\" XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
-.de Sh \" Subsection
-.br
-.if t .Sp
-.ne 5
-.PP
-\fB\\$1\fR
-.PP
-..
-.de Sp \" Vertical space (when we can't use .PP)
-.if t .sp .5v
-.if n .sp
-..
-.de Ip \" List item
-.br
-.ie \\n(.$>=3 .ne \\$3
-.el .ne 3
-.IP "\\$1" \\$2
-..
-.TH "CTLOGCONFIG" 8 "@date@" "Apache HTTP Server" "ctlogconfig"
+.\" XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
+.\" DO NOT EDIT! Generated from XML source.
+.\" XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
+.de Sh \" Subsection
+.br
+.if t .Sp
+.ne 5
+.PP
+\fB\\$1\fR
+.PP
+..
+.de Sp \" Vertical space (when we can't use .PP)
+.if t .sp .5v
+.if n .sp
+..
+.de Ip \" List item
+.br
+.ie \\n(.$>=3 .ne \\$3
+.el .ne 3
+.IP "\\$1" \\$2
+..
+.TH "CTLOGCONFIG" 8 "2018-03-03" "Apache HTTP Server" "ctlogconfig"
-.SH NAME
-ctlogconfig \- Certificate Transparency log configuration tool
+.SH NAME
+ctlogconfig \- Certificate Transparency log configuration tool
-.SH "SYNOPSIS"
-  
-.PP
-\fBctlogconfig\fR \fI/path/to/db\fR \fBdump\fR
- 
-.PP
-\fBctlogconfig\fR \fI/path/to/db\fR \fBconfigure-public-key\fR [ \fIlog-id\fR|\fIrecord-id\fR ] \fI/path/to/public-key\&.pem\fR
- 
-.PP
-\fBctlogconfig\fR \fI/path/to/db\fR \fBconfigure-url\fR [ \fIlog-id\fR|\fIrecord-id\fR ] \fIlog-URL\fR
- 
-.PP
-\fBctlogconfig\fR \fI/path/to/db\fR \fBvalid-time-range\fR \fIlog-id\fR|\fIrecord-id\fR \fImin-timestamp\fR \fImax-timestamp\fR
- 
-.PP
-\fBctlogconfig\fR \fI/path/to/db\fR \fBtrust\fR \fIlog-id\fR|\fIrecord-id\fR
- 
-.PP
-\fBctlogconfig\fR \fI/path/to/db\fR \fBdistrust\fR \fIlog-id\fR|\fIrecord-id\fR
- 
-.PP
-\fBctlogconfig\fR \fI/path/to/db\fR \fBforget\fR \fIlog-id\fR|\fIrecord-id\fR
- 
- 
-.TP
-\fIlog-id\fR
-This is the id of the log, which is the SHA-256 hash of the log's public key, provided in hexadecimal format\&. This string is 64 characters in length\&.  
-.TP
-\fIrecord-id\fR
-This is the record number in the database, as displayed by the \fBdump\fR sub-command, prefixed with \fB#\fR\&. As an example, \fB#4\fR references the fourth record in the database\&. (Use shell escaping as necessary\&.)  
-.TP
-\fI/path/to/public-key\&.pem\fR
-This is a file containing the log's public key in PEM format\&. The public key is not stored in the database\&. Instead, a reference to the file is stored\&. Thus, the file cannot be removed until the public key in the database is removed or changed\&.  
-.TP
-\fImin-timestamp\fR, \fImax-timestamp\fR
-A timestamp is a time as expressed in the number of milliseconds since the epoch, ignoring leap seconds\&. This is the form of time used in Signed Certificate Timestamps\&. This must be provided as a decimal number\&. Specify \fB-\fR for one of the timestamps if it is unknown\&. For example, when configuring the minimum valid timestamp for a log which remains valid, specify \fB-\fR for \fImax-timestamp\fR\&. SCTs received from this log by the proxy are invalid if the timestamp is older than \fImin-timestamp\fR or newer than \fImax-timestamp\fR\&.  
- 
+.SH "SYNOPSIS"
+
+.PP
+\fBctlogconfig\fR \fI/path/to/db\fR \fBdump\fR
+
+.PP
+\fBctlogconfig\fR \fI/path/to/db\fR \fBconfigure-public-key\fR [ \fIlog-id\fR|\fIrecord-id\fR ] \fI/path/to/public-key\&.pem\fR
+
+.PP
+\fBctlogconfig\fR \fI/path/to/db\fR \fBconfigure-url\fR [ \fIlog-id\fR|\fIrecord-id\fR ] \fIlog-URL\fR
+
+.PP
+\fBctlogconfig\fR \fI/path/to/db\fR \fBvalid-time-range\fR \fIlog-id\fR|\fIrecord-id\fR \fImin-timestamp\fR \fImax-timestamp\fR
+
+.PP
+\fBctlogconfig\fR \fI/path/to/db\fR \fBtrust\fR \fIlog-id\fR|\fIrecord-id\fR
+
+.PP
+\fBctlogconfig\fR \fI/path/to/db\fR \fBdistrust\fR \fIlog-id\fR|\fIrecord-id\fR
+
+.PP
+\fBctlogconfig\fR \fI/path/to/db\fR \fBforget\fR \fIlog-id\fR|\fIrecord-id\fR
+
+
+.TP
+\fIlog-id\fR
+This is the id of the log, which is the SHA-256 hash of the log's public key, provided in hexadecimal format\&. This string is 64 characters in length\&.
+.TP
+\fIrecord-id\fR
+This is the record number in the database, as displayed by the \fBdump\fR sub-command, prefixed with \fB#\fR\&. As an example, \fB#4\fR references the fourth record in the database\&. (Use shell escaping as necessary\&.)
+.TP
+\fI/path/to/public-key\&.pem\fR
+This is a file containing the log's public key in PEM format\&. The public key is not stored in the database\&. Instead, a reference to the file is stored\&. Thus, the file cannot be removed until the public key in the database is removed or changed\&.
+.TP
+\fImin-timestamp\fR, \fImax-timestamp\fR
+A timestamp is a time as expressed in the number of milliseconds since the epoch, ignoring leap seconds\&. This is the form of time used in Signed Certificate Timestamps\&. This must be provided as a decimal number\&. Specify \fB-\fR for one of the timestamps if it is unknown\&. For example, when configuring the minimum valid timestamp for a log which remains valid, specify \fB-\fR for \fImax-timestamp\fR\&. SCTs received from this log by the proxy are invalid if the timestamp is older than \fImin-timestamp\fR or newer than \fImax-timestamp\fR\&.
+
-.SH "SUMMARY"
- 
-.PP
-ctlogconfig is a tool for creating and maintaining a log configuration database, for use with mod_ssl_ct\&.
- 
-.PP
-Refer first to Log configuration in the mod_ssl_ct documentation\&.
- 
-.PP
-Refer to the examples below for typical use\&.
- 
+.SH "SUMMARY"
+
+.PP
+ctlogconfig is a tool for creating and maintaining a log configuration database, for use with mod_ssl_ct\&.
+
+.PP
+Refer first to Log configuration in the mod_ssl_ct documentation\&.
+
+.PP
+Refer to the examples below for typical use\&.
+
-.SH "SUB-COMMANDS"
-  
- 
-.TP
-dump
-Display configuration database contents\&. The record id shown in the output of this sub-command can be used to identify the affected record in other sub-commands\&.  
-.TP
-configure-public-key
-Add a log's public key to the database or set the public key for an existing entry\&. The log's public key is needed to validate the signature of SCTs received by a proxy from a backend server\&. (The database will be created if it does not yet exist\&.)  
-.TP
-configure-url
-Add a log's URL to the database or set the URL for an existing entry\&. The log's URL is used when submitting server certificates to logs in order to obtain SCTs to send to clients\&. (The database will be created if it does not yet exist\&.)  
-.TP
-valid-time-range
-Set the minimum valid time and/or the maximum valid time for a log\&. SCTs from the log with timestamps outside of the valid range will not be accepted\&. Use - for a time that is not being configured\&. (The database will be created if it does not yet exist\&.)  
-.TP
-trust
-Mark a log as trusted, which is the default setting\&. This sub-command is used to reverse a \fIdistrust\fR setting\&. (The database will be created if it does not yet exist\&.)  
-.TP
-distrust
-Mark a log as distrusted\&. (The database will be created if it does not yet exist\&.)  
-.TP
-forget
-Remove information about a log from the database\&.  
- 
-.SH "EXAMPLES"
-  
-.PP
-Consider an Apache httpd instance which serves as a TLS server and a proxy\&. The TLS server needs to obtain SCTs from a couple of known logs in order to pass those to clients, and the proxy needs to be able to validate the signature of SCTs received from backend servers\&.
- 
-.PP
-First we'll configure the URLs for logs where server certificates are logged:
- 
-.nf
+.SH "SUB-COMMANDS"
+
+
+.TP
+dump
+Display configuration database contents\&. The record id shown in the output of this sub-command can be used to identify the affected record in other sub-commands\&.
+.TP
+configure-public-key
+Add a log's public key to the database or set the public key for an existing entry\&. The log's public key is needed to validate the signature of SCTs received by a proxy from a backend server\&. (The database will be created if it does not yet exist\&.)
+.TP
+configure-url
+Add a log's URL to the database or set the URL for an existing entry\&. The log's URL is used when submitting server certificates to logs in order to obtain SCTs to send to clients\&. (The database will be created if it does not yet exist\&.)
+.TP
+valid-time-range
+Set the minimum valid time and/or the maximum valid time for a log\&. SCTs from the log with timestamps outside of the valid range will not be accepted\&. Use - for a time that is not being configured\&. (The database will be created if it does not yet exist\&.)
+.TP
+trust
+Mark a log as trusted, which is the default setting\&. This sub-command is used to reverse a \fIdistrust\fR setting\&. (The database will be created if it does not yet exist\&.)
+.TP
+distrust
+Mark a log as distrusted\&. (The database will be created if it does not yet exist\&.)
+.TP
+forget
+Remove information about a log from the database\&.
+
+.SH "EXAMPLES"
+
+.PP
+Consider an Apache httpd instance which serves as a TLS server and a proxy\&. The TLS server needs to obtain SCTs from a couple of known logs in order to pass those to clients, and the proxy needs to be able to validate the signature of SCTs received from backend servers\&.
+
+.PP
+First we'll configure the URLs for logs where server certificates are logged:
+
+.nf
-    $ ctlogconfig /path/to/conf/log-config configure-url http://log1\&.example\&.com/
-    $ ctlogconfig /path/to/conf/log-config configure-url http://log2\&.example\&.com/
-    $ ctlogconfig /path/to/conf/log-config dump
-    Log entry:
-      Record 1
-      Log id         : (not configured)
-      Public key file: (not configured)
-      URL            : http://log1\&.example\&.com/
-      Time range     : -INF to +INF 
-    Log entry:
-      Record 2
-      Log id         : (not configured)
-      Public key file: (not configured)
-      URL            : http://log2\&.example\&.com/
-      Time range     : -INF to +INF 
-.fi
- 
-.PP
-Next we'll set the public key of a log where the certificate of our only backend server is published\&. In this case it is the log with URL http://log2\&.example\&.com/ which has already been configured\&.
- 
-.nf
+ $ ctlogconfig /path/to/conf/log-config configure-url http://log1\&.example\&.com/
+ $ ctlogconfig /path/to/conf/log-config configure-url http://log2\&.example\&.com/
+ $ ctlogconfig /path/to/conf/log-config dump
+ Log entry:
+ Record 1
+ Log id : (not configured)
+ Public key file: (not configured)
+ URL : http://log1\&.example\&.com/
+ Time range : -INF to +INF
+ Log entry:
+ Record 2
+ Log id : (not configured)
+ Public key file: (not configured)
+ URL : http://log2\&.example\&.com/
+ Time range : -INF to +INF
+.fi
+
+.PP
+Next we'll set the public key of a log where the certificate of our only backend server is published\&. In this case it is the log with URL http://log2\&.example\&.com/ which has already been configured\&.
+
+.nf
-    $ ctlogconfig /path/to/conf/log-config configure-public-key \\
-    $ ctlogconfig /path/to/conf/log-config dump
-    Log entry:
-      Record 1
-      Log id         : (not configured)
-      Public key file: (not configured)
-      URL            : http://log1\&.example\&.com/
-      Time range     : -INF to +INF 
-    Log entry:
-      Record 2
-      Log id         : (not configured)
-      Public key file: /path/to/conf/log2-pub\&.pem
-      URL            : http://log2\&.example\&.com/
-      Time range     : -INF to +INF 
-.fi
- 
+ $ ctlogconfig /path/to/conf/log-config configure-public-key \\
+ $ ctlogconfig /path/to/conf/log-config dump
+ Log entry:
+ Record 1
+ Log id : (not configured)
+ Public key file: (not configured)
+ URL : http://log1\&.example\&.com/
+ Time range : -INF to +INF
+ Log entry:
+ Record 2
+ Log id : (not configured)
+ Public key file: /path/to/conf/log2-pub\&.pem
+ URL : http://log2\&.example\&.com/
+ Time range : -INF to +INF
+.fi
+
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="Alias" id="Alias">Alias</a> <a name="alias" id="alias">Directiva</a></h2>
+<div class="directive-section"><h2><a name="alias" id="alias">Directiva</a> <a name="Alias" id="Alias">Alias</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Mapea URLs a rutas del sistema de ficheros</td></tr>
<tr><th><a href="directive-dict.html#Syntax">Sintaxis:</a></th><td><code>Alias [<var>URL-path</var>]
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="AliasMatch" id="AliasMatch">AliasMatch</a> <a name="aliasmatch" id="aliasmatch">Directiva</a></h2>
+<div class="directive-section"><h2><a name="aliasmatch" id="aliasmatch">Directiva</a> <a name="AliasMatch" id="AliasMatch">AliasMatch</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Mapea URLs a ubicaciones del sistema de ficheros usando expresiones regulares</td></tr>
<tr><th><a href="directive-dict.html#Syntax">Sintaxis:</a></th><td><code>AliasMatch <var>regex</var>
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="Redirect" id="Redirect">Redirect</a> <a name="redirect" id="redirect">Directiva</a></h2>
+<div class="directive-section"><h2><a name="redirect" id="redirect">Directiva</a> <a name="Redirect" id="Redirect">Redirect</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Envía una redirección externa indicando al cliente que solicite una URL distinta</td></tr>
<tr><th><a href="directive-dict.html#Syntax">Sintaxis:</a></th><td><code>Redirect [<var>status</var>] [<var>URL-path</var>]
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="RedirectMatch" id="RedirectMatch">RedirectMatch</a> <a name="redirectmatch" id="redirectmatch">Directiva</a></h2>
+<div class="directive-section"><h2><a name="redirectmatch" id="redirectmatch">Directiva</a> <a name="RedirectMatch" id="RedirectMatch">RedirectMatch</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Envía una redirección externa basada en una coincidencia de expresión regular con la URL actual
</td></tr>
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="RedirectPermanent" id="RedirectPermanent">RedirectPermanent</a> <a name="redirectpermanent" id="redirectpermanent">Directiva</a></h2>
+<div class="directive-section"><h2><a name="redirectpermanent" id="redirectpermanent">Directiva</a> <a name="RedirectPermanent" id="RedirectPermanent">RedirectPermanent</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Envía una redirección externa permanente indicando al cliente que solicite una URL diferente</td></tr>
<tr><th><a href="directive-dict.html#Syntax">Sintaxis:</a></th><td><code>RedirectPermanent <var>URL-path</var> <var>URL</var></code></td></tr>
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="RedirectTemp" id="RedirectTemp">RedirectTemp</a> <a name="redirecttemp" id="redirecttemp">Directiva</a></h2>
+<div class="directive-section"><h2><a name="redirecttemp" id="redirecttemp">Directiva</a> <a name="RedirectTemp" id="RedirectTemp">RedirectTemp</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Envía una redirección externa temporal indicando al cliente que solicite una URL diferente</td></tr>
<tr><th><a href="directive-dict.html#Syntax">Sintaxis:</a></th><td><code>RedirectTemp <var>URL-path</var> <var>URL</var></code></td></tr>
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="ScriptAlias" id="ScriptAlias">ScriptAlias</a> <a name="scriptalias" id="scriptalias">Directiva</a></h2>
+<div class="directive-section"><h2><a name="scriptalias" id="scriptalias">Directiva</a> <a name="ScriptAlias" id="ScriptAlias">ScriptAlias</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Mapea una URL a una ubicación del sistema de ficheros y designa el destino como un script CGI</td></tr>
<tr><th><a href="directive-dict.html#Syntax">Sintaxis:</a></th><td><code>ScriptAlias [<var>URL-path</var>]
</ul>
</div>
<div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div>
-<div class="directive-section"><h2><a name="ScriptAliasMatch" id="ScriptAliasMatch">ScriptAliasMatch</a> <a name="scriptaliasmatch" id="scriptaliasmatch">Directiva</a></h2>
+<div class="directive-section"><h2><a name="scriptaliasmatch" id="scriptaliasmatch">Directiva</a> <a name="ScriptAliasMatch" id="ScriptAliasMatch">ScriptAliasMatch</a></h2>
<table class="directive">
<tr><th><a href="directive-dict.html#Description">Descripción:</a></th><td>Mapea una URL a una ubicación del sistema de ficheros usando
una expresión regular y designa el destino como un script CGI</td></tr>