From 58e0f77a23fd9ef3c6e5a84fca675b178810a0ad Mon Sep 17 00:00:00 2001
From: Kaspar Brand
-The following four storage types are currently supported:
+The following five storage types are currently supported:none
@@ -1979,6 +1989,161 @@ values like 300 in real life.
SSLSessionCacheTimeout 600
+
+
+Description: | Configures the OCSP stapling cache |
---|---|
Syntax: | SSLStaplingCache type |
Context: | server config |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
Configures the cache used to store OCSP responses which get included
+in the TLS handshake if SSLUseStapling
+is enabled. Configuration of a cache is mandatory for OCSP stapling.
+With the exception of none
and nonenotnull
,
+the same storage types are supported as with
+SSLSessionCache
.
Description: | Number of seconds before expiring invalid responses in the OCSP stapling cache |
---|---|
Syntax: | SSLStaplingErrorCacheTimeout seconds |
Default: | SSLStaplingErrorCacheTimeout 600 |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
Sets the timeout in seconds before invalid responses
+in the OCSP stapling cache (configured through SSLStaplingCache
) will expire.
+To set the cache timeout for valid responses, see
+SSLStaplingStandardCacheTimeout
.
Description: | Synthesize "tryLater" responses for failed OCSP stapling queries |
---|---|
Syntax: | SSLStaplingFakeTryLater on|off |
Default: | SSLStaplingFakeTryLater on |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
When enabled and a query to an OCSP responder for stapling
+purposes fails, mod_ssl will synthesize a "tryLater" response for the
+client. Only effective if SSLStaplingReturnResponderErrors
+is also enabled.
Description: | Override the OCSP responder URI specified in the certificate's AIA extension |
---|---|
Syntax: | SSLStaplingForceURL uri |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
This directive overrides the URI of an OCSP responder as obtained from +the authorityInfoAccess (AIA) extension of the certificate. +Of potential use when going through a proxy for retrieving OCSP queries.
+ +Description: | Timeout for OCSP stapling queries |
---|---|
Syntax: | SSLStaplingResponderTimeout seconds |
Default: | SSLStaplingResponderTimeout 10 |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
This option sets the timeout for queries to OCSP responders when
+SSLUseStapling
is enabled
+and mod_ssl is querying a responder for OCSP stapling purposes.
Description: | Maximum allowable age for OCSP stapling responses |
---|---|
Syntax: | SSLStaplingResponseMaxAge seconds |
Default: | SSLStaplingResponseMaxAge -1 |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
This option sets the maximum allowable age ("freshness") when
+considering OCSP responses for stapling purposes, i.e. when
+SSLUseStapling
is turned on.
+The default value (-1
) does not enforce a maximum age,
+which means that OCSP responses are considered valid as long as their
+nextUpdate
field is in the future.
Description: | Maximum allowable time skew for OCSP stapling response validation |
---|---|
Syntax: | SSLStaplingResponseTimeSkew seconds |
Default: | SSLStaplingResponseTimeSkew 300 |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
This option sets the maximum allowable time skew when mod_ssl checks the
+thisUpdate
and nextUpdate
fields of OCSP responses
+which get included in the TLS handshake (OCSP stapling). Only applicable
+if SSLUseStapling
is turned on.
Description: | Pass stapling related OCSP errors on to client |
---|---|
Syntax: | SSLStaplingReturnResponderErrors on|off |
Default: | SSLStaplingReturnResponderErrors on |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
When enabled, mod_ssl will pass responses from unsuccessful
+stapling related OCSP queries (such as status errors, expired responses etc.)
+on to the client. If set to off
, no stapled responses
+for failed queries will be included in the TLS handshake.
Description: | Number of seconds before expiring responses in the OCSP stapling cache |
---|---|
Syntax: | SSLStaplingStandardCacheTimeout seconds |
Default: | SSLStaplingStandardCacheTimeout 3600 |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
Sets the timeout in seconds before responses in the OCSP stapling cache
+(configured through SSLStaplingCache
)
+will expire. This directive applies to valid responses, while
+SSLStaplingErrorCacheTimeout
is
+used for controlling the timeout for invalid/unavailable responses.
+
Description: | Enable stapling of OCSP responses in the TLS handshake |
---|---|
Syntax: | SSLUseStapling on|off |
Default: | SSLUseStapling off |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_ssl |
Compatibility: | Available in httpd 2.3.3 and later, if using OpenSSL 0.9.8h or later |
This option enables OCSP stapling, as defined by the "Certificate
+Status Request" TLS extension specified in RFC 6066. If enabled (and
+requested by the client), mod_ssl will include an OCSP response
+for its own certificate in the TLS handshake. Configuring an
+SSLStaplingCache
is a
+prerequisite for enabling OCSP stapling.
OCSP stapling relieves the client of querying the OCSP responder
+on its own, but it should be noted that in its current specification,
+the server's CertificateStatus
reply may only include an
+OCSP response for a single cert. For server certificates with intermediate
+CA certificates in their chain (the typical case nowadays),
+stapling in its current form therefore only partially achieves the
+stated goal of "saving roundtrips and resources" - see also the
+"Adding Multiple TLS Certificate Status Extension requests" Internet draft.
+
mod_ext-filter
: The DebugLevel
option has been removed in favour of per-module LogLevel
configuration.
mod_ssl
: CRL based revocation checking
+ now needs to be explicitly configured through SSLCARevocationCheck
.
+