Return-Path: Delivered-To: apmail-httpd-cvs-archive@www.apache.org Received: (qmail 99649 invoked from network); 3 Jun 2004 10:17:29 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur-2.apache.org with SMTP; 3 Jun 2004 10:17:29 -0000 Received: (qmail 79790 invoked by uid 500); 3 Jun 2004 10:17:46 -0000 Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org Received: (qmail 79763 invoked by uid 500); 3 Jun 2004 10:17:46 -0000 Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list cvs@httpd.apache.org Received: (qmail 79750 invoked by uid 500); 3 Jun 2004 10:17:45 -0000 Delivered-To: apmail-httpd-2.0-cvs@apache.org Received: (qmail 79746 invoked by uid 99); 3 Jun 2004 10:17:45 -0000 Received: from [209.237.227.194] (HELO minotaur.apache.org) (209.237.227.194) by apache.org (qpsmtpd/0.27.1) with SMTP; Thu, 03 Jun 2004 03:17:45 -0700 Received: (qmail 99435 invoked by uid 1582); 3 Jun 2004 10:17:13 -0000 Date: 3 Jun 2004 10:17:13 -0000 Message-ID: <20040603101713.99434.qmail@minotaur.apache.org> From: jorton@apache.org To: httpd-2.0-cvs@apache.org Subject: cvs commit: httpd-2.0/docs/manual/ssl ssl_compat.html.en X-Virus-Checked: Checked X-Spam-Rating: minotaur-2.apache.org 1.6.2 0/1000/N jorton 2004/06/03 03:17:13 Modified: docs/manual/ssl ssl_compat.html.en Log: Update transformation. Revision Changes Path 1.14 +32 -38 httpd-2.0/docs/manual/ssl/ssl_compat.html.en Index: ssl_compat.html.en =================================================================== RCS file: /home/cvs/httpd-2.0/docs/manual/ssl/ssl_compat.html.en,v retrieving revision 1.13 retrieving revision 1.14 diff -d -w -u -r1.13 -r1.14 --- ssl_compat.html.en 21 Feb 2004 00:31:45 -0000 1.13 +++ ssl_compat.html.en 3 Jun 2004 10:17:13 -0000 1.14 @@ -28,22 +28,24 @@

-Here we talk about backward compatibility to other SSL solutions. As you -perhaps know, mod_ssl is not the only existing SSL solution for Apache. -Actually there are four additional major products available on the market: Ben -Laurie's freely available Apache-SSL -(from where mod_ssl were originally derived in 1998), Red Hat's commercial Secure Web -Server (which is based on mod_ssl), Covalent's commercial Raven SSL Module (also based on mod_ssl) -and finally C2Net's commercial product Stronghold (based on a -different evolution branch named Sioux up to Stronghold 2.x and based on -mod_ssl since Stronghold 3.x).

+This page covers backwards compatibility between mod_ssl and other +SSL solutions. mod_ssl is not the only SSL solution for Apache; four +additional products are (or were) also available: Ben Laurie's freely +available Apache-SSL (from +where mod_ssl were originally derived in 1998), Red Hat's commercial +Secure +Web Server (which was based on mod_ssl), Covalent's commercial Raven SSL Module (also based on +mod_ssl) and finally C2Net's (now Red Hat's) commercial product Stronghold (based +on a different evolution branch named Sioux up to Stronghold 2.x and +based on mod_ssl since Stronghold 3.x).

-The idea in mod_ssl is mainly the following: because mod_ssl provides mostly a -superset of the functionality of all other solutions we can easily provide -backward compatibility for most of the cases. Actually there are three -compatibility areas we currently address: configuration directives, -environment variables and custom log functions.

+mod_ssl mostly provides a superset of the functionality of all other +solutions, so it's simple to migrate from one of the older modules to +mod_ssl. The configuration directives and environment variable names +used by the older SSL solutions vary from those used in mod_ssl; +tables are included here to give the equivalents used by mod_ssl to +allow easy migration. .

  • Configuration Directives
  • Environment Variables
  • @@ -52,15 +54,11 @@
    top

    Configuration Directives

    -

    For backward compatibility to the configuration directives of other SSL -solutions we do an on-the-fly mapping: directives which have a direct -counterpart in mod_ssl are mapped silently while other directives lead to a -warning message in the logfiles. The currently implemented directive mapping -is listed in Table 1. Currently full backward -compatibility is provided only for Apache-SSL 1.x and mod_ssl 2.0.x. -Compatibility to Sioux 1.x and Stronghold 2.x is only partial because of -special functionality in these interfaces which mod_ssl (still) doesn't -provide.

    +

    The mapping between configuration directives used by Apache-SSL +1.x and mod_ssl 2.0.x is given in Table +1. The mapping from Sioux 1.x and Stronghold 2.x is only partial +because of special functionality in these interfaces which mod_ssl +doesn't provide.

    Table 1: Configuration Directive Mapping

    @@ -98,9 +96,9 @@ SSL_X509VerifyPolicy arg-functionality not supported SSL_LogX509Attributes arg-functionality not supported Stronghold 2.x compatibility: -StrongholdAccelerator dir-functionality not supported -StrongholdKey dir-functionality not supported -StrongholdLicenseFile dir-functionality not supported +StrongholdAccelerator engineSSLCryptoDevice enginerenamed +StrongholdKey dir-functionality not needed +StrongholdLicenseFile dir-functionality not needed SSLFlag flagSSLEngine flagrenamed SSLSessionLockFile fileSSLMutex filerenamed SSLCipherList specSSLCipherSuite specrenamed @@ -110,20 +108,17 @@ SSL_CertificateLogDir dir-functionality not supported AuthCertDir dir-functionality not supported SSL_Group name-functionality not supported -SSLProxyMachineCertPath dir-functionality not supported -SSLProxyMachineCertFile file-functionality not supported -SSLProxyCACertificatePath dir-functionality not supported -SSLProxyCACertificateFile file-functionality not supported -SSLProxyVerifyDepth number-functionality not supported -SSLProxyCipherList spec-functionality not supported +SSLProxyMachineCertPath dirSSLProxyMachineCertificatePath dirrenamed +SSLProxyMachineCertFile fileSSLProxyMachineCertificateFile filerenamed +SSLProxyCipherList specSSLProxyCipherSpec specrenamed
    top

    Environment Variables

    -

    When you use ``SSLOptions +CompatEnvVars'' additional environment -variables are generated. They all correspond to existing official mod_ssl -variables. The currently implemented variable derivation is listed in Table 2.

    + +

    The mapping between environment variable names used by the older +SSL solutions and the names used by mod_ssl is given in Table 2.

    Table 2: Environment Variable Derivation

    @@ -199,8 +194,7 @@

    Custom Log Functions

    -When mod_ssl is built into Apache or at least loaded (under DSO situation) -additional functions exist for the Custom Log Format of +When mod_ssl is enabled, additional functions exist for the Custom Log Format of mod_log_config as documented in the Reference Chapter. Beside the ``%{varname}x'' eXtension format function which can be used to expand any variables provided