From 23481b9c36ef17d8c06f44f43132479cd62ebd63 Mon Sep 17 00:00:00 2001
From: Richard Bowen
If you need to use SSL when contacting remote servers, have a look at the
+SSLProxy*
directives in mod_ssl.
Do not enable proxying with
+This directive sets the directory where you keep the certificates of
+Certification Authorities (CAs) whose proxy client certificates are used for
+authentication of the proxy server to remote servers.
+ The files in this directory must be PEM-encoded and are accessed through
+hash filenames. Additionally, you must create symbolic links named
+
+Example:
+This directive sets the directory where you keep the certificates of
+Certification Authorities (CAs) whose proxy client certificates are used for
+authentication of the proxy server to remote servers.
+
+This referenced file is simply the concatenation of the various PEM-encoded
+certificate files, in order of preference. Use this directive alternatively
+or additionally to
+Example:
+This directive sets the Certificate verification level for the remote server
+Authentication. Notice that this directive can be used both in per-server and
+per-directory context. In per-server context it applies to the remote server
+authentication process used in the standard SSL handshake when a connection is
+established. In per-directory context it forces a SSL renegotation with the
+reconfigured remote server verification level after the HTTP request was read but
+before the HTTP response is sent.
+The following levels are available for level: In practice only levels none and
+require are really interesting, because level
+optional doesn't work with all servers and level
+optional_no_ca is actually against the idea of
+authentication (but can be used to establish SSL test pages, etc.)
+This directive sets how deeply mod_ssl should verify before deciding that the
+remote server does not have a valid certificate. Notice that this directive can be
+used both in per-server and per-directory context. In per-server context it
+applies to the client authentication process used in the standard SSL
+handshake when a connection is established. In per-directory context it forces
+a SSL renegotation with the reconfigured remote server verification depth after the
+HTTP request was read but before the HTTP response is sent.
+The depth actually is the maximum number of intermediate certificate issuers,
+i.e. the number of CA certificates which are max allowed to be followed while
+verifying the remote server certificate. A depth of 0 means that self-signed
+remote server certificates are accepted only, the default depth of 1 means
+the remote server certificate can be self-signed or has to be signed by a CA
+which is directly known to the server (i.e. the CA's certificate is under
+
+This directive toggles the usage of the SSL/TLS Protocol Engine for proxy. This
+is usually used inside a
+This directive can be used to control the SSL protocol flavors mod_ssl should
+use when establishing its server environment for proxy . It will only connect
+to servers using one of the provided protocols. Please refer to Equivalent to
+This directive sets the directory where you keep the Certificates of
+Certification Authorities (CAs) whose remote servers you deal with. These are used to
+verify the remote server certificate on Remote Server Authentication.
+The files in this directory have to be PEM-encoded and are accessed through
+hash filenames. So usually you can't just place the Certificate files
+there: you also have to create symbolic links named
+hash-value
+This directive sets the all-in-one file where you can assemble the
+Certificates of Certification Authorities (CA) whose remote servers you deal
+with. These are used for Remote Server Authentication. Such a file is simply the
+concatenation of the various PEM-encoded Certificate files, in order of
+preference. This can be used alternatively and/or additionally to
+
+This directive sets the directory where you keep the Certificate Revocation
+Lists (CRL) of Certification Authorities (CAs) whose remote servers you deal with.
+These are used to revoke the remote server certificate on Remote Server Authentication.
+The files in this directory have to be PEM-encoded and are accessed through
+hash filenames. So usually you have not only to place the CRL files there.
+Additionally you have to create symbolic links named
+hash-value
+This directive sets the all-in-one file where you can
+assemble the Certificate Revocation Lists (CRL) of Certification
+Authorities (CA) whose remote servers you deal with. These are used
+for Remote Server Authentication. Such a file is simply the concatenation of
+the various PEM-encoded CRL files, in order of preference. This can be
+used alternatively and/or additionally to hash-value.N
. And you should always make sure this
+directory contains the appropriate symbolic links. Use the Makefile which
+comes with mod_ssl to accomplish this task.
+SSLProxyMachineCertificatePath
.
+
+
+
+ but it need not to be (successfully) verifiable.
+SSLProxyEngine on
+...
+</VirtualHost>
+SSLCipherSuite
, but for the proxy connection.
+Please refer to .N
. And you should always make sure this directory
+contains the appropriate symbolic links. Use the Makefile
which
+comes with mod_ssl to accomplish this task..rN
. And you should always make sure this directory
+contains the appropriate symbolic links. Use the Makefile
which
+comes with