# HG changeset patch # User Vladimir Homutov # Date 1349185496 0 # Node ID 2eb83e89b239239bc84f1d54adfbd7ff92f16635 # Parent 2ced25001893a16c247b4b736f76f25b6f52465a Added the OCSP stapling documentation in English. diff -r 2ced25001893 -r 2eb83e89b239 xml/en/docs/http/ngx_http_ssl_module.xml --- a/xml/en/docs/http/ngx_http_ssl_module.xml Mon Oct 01 13:50:19 2012 +0000 +++ b/xml/en/docs/http/ngx_http_ssl_module.xml Tue Oct 02 13:44:56 2012 +0000 @@ -197,8 +197,15 @@ server -Specifies a file with CA certificates in the PEM format -used for client certificate verification. +Specifies a file with a list of CA certificates in the PEM format +used to verify client certificates and +OCSP responses if is enabled. + + + +The list of certificates will be sent to clients. +If this is not desired, the +directive can be used. @@ -348,6 +355,129 @@ + +on | off +off +http +server +1.3.7 + + +Enables or disables +stapling +of OCSP responses by the server. +Example: + +ssl_stapling on; +resolver 192.0.2.1; + + + + +For the OCSP stapling to work, the certificate of the issuer of the server +certificate should be known. +If the ssl_certificate file does +not contain intermediate certificates, +the certificate of the issuer of the server certificate should be +present in the +ssl_trusted_certificate file. + + + +The directive +should also be specified to allow for a resolution +of an OCSP responder hostname. + + + + + + +file + +http +server +1.3.7 + + +When set, the stapled OCSP response will be taken from the +specified file instead of querying +the OCSP responder specified in the server certificate. + + + +The file should be in the DER format as produced by the +“openssl ocsp” command. + + + + + + +url + +http +server +1.3.7 + + +Overrides the URL of OCSP responder specified in the +“Authority +Information Access” certificate extension. + + + +Only “http://” OCSP responders are supported: + +ssl_stapling_responder http://ocsp.example.com/; + + + + + + + +on | off +off +http +server +1.3.7 + + +Enables or disables verification of OCSP responses by the server. + + + +For verification to work, the certificate of the issuer of the server +certificate, the root certificate, and all intermediate certificates +should be configured as trusted using the + directive. + + + + + + +file + +http +server +1.3.7 + + +Specifies a file with a list of CA certificates in the PEM format +used to verify client certificates and +OCSP responses if is enabled. + + + +In contrast to , these certificates +will not be sent to clients. + + + + + on | off |