summaryrefslogtreecommitdiffhomepage
path: root/src/http/modules/ngx_http_ssl_module.c (follow)
AgeCommit message (Collapse)AuthorFilesLines
2013-03-20Preliminary experimental support for SPDY draft 2.Valentin Bartenev1-1/+16
2013-03-07SSL: Next Protocol Negotiation extension support.Valentin Bartenev1-0/+34
Not only this is useful for the upcoming SPDY support, but it can also help to improve HTTPS performance by enabling TLS False Start in Chrome/Chromium browsers [1]. So, we always enable NPN for HTTPS if it is supported by OpenSSL. [1] http://www.imperialviolet.org/2012/04/11/falsestart.html
2013-02-19Removed zero termination of shm zone names.Valentin Bartenev1-1/+0
It was added in r2717 and no longer needed since r2721, where the termination was added to ngx_shm_alloc() and ngx_init_zone_pool(). So then it only corrupts error messages about ivalid zones.
2012-10-05OCSP stapling: properly check if there is ssl.ctx.Maxim Dounin1-1/+1
This fixes segfault if stapling was enabled in a server without a certificate configured (and hence no ssl.ctx).
2012-10-03SSL: the "ssl_verify_client" directive parameter "optional_no_ca".Maxim Dounin1-1/+2
This parameter allows to don't require certificate to be signed by a trusted CA, e.g. if CA certificate isn't known in advance, like in WebID protocol. Note that it doesn't add any security unless the certificate is actually checked to be trusted by some external means (e.g. by a backend). Patch by Mike Kazantsev, Eric O'Connor.
2012-10-01OCSP stapling: ssl_stapling_verify directive.Maxim Dounin1-2/+11
OCSP response verification is now switched off by default to simplify configuration, and the ssl_stapling_verify allows to switch it on. Note that for stapling OCSP response verification isn't something required as it will be done by a client anyway. But doing verification on a server allows to mitigate some attack vectors, most notably stop an attacker from presenting some specially crafted data to all site clients.
2012-10-01OCSP stapling: loading OCSP responses.Maxim Dounin1-5/+56
This includes the ssl_stapling_responder directive (defaults to OCSP responder set in certificate's AIA extension). OCSP response for a given certificate is requested once we get at least one connection with certificate_status extension in ClientHello, and certificate status won't be sent in the connection in question. This due to limitations in the OpenSSL API (certificate status callback is blocking). Note: SSL_CTX_use_certificate_chain_file() was reimplemented as it doesn't allow to access the certificate loaded via SSL_CTX.
2012-10-01OCSP stapling: ssl_stapling_file support.Maxim Dounin1-0/+24
Very basic version without any OCSP responder query code, assuming valid DER-encoded OCSP response is present in a ssl_stapling_file configured. Such file might be produced with openssl like this: openssl ocsp -issuer root.crt -cert domain.crt -respout domain.staple \ -url http://ocsp.example.com
2012-10-01OCSP stapling: ssl_trusted_certificate directive.Maxim Dounin1-3/+21
The directive allows to specify additional trusted Certificate Authority certificates to be used during certificate verification. In contrast to ssl_client_certificate DNs of these cerificates aren't sent to a client during handshake. Trusted certificates are loaded regardless of the fact whether client certificates verification is enabled as the same certificates will be used for OCSP stapling, during construction of an OCSP request and for verification of an OCSP response. The same applies to a CRL (which is now always loaded).
2012-01-18Copyright updated.Maxim Konovalov1-0/+1
2012-01-11Added support for TLSv1.1, TLSv1.2 in ssl_protocols directive.Maxim Dounin1-1/+4
Support for TLSv1.1 and TLSv1.2 protocols was introduced in OpenSSL 1.0.1 (-beta1 was recently released). This change makes it possible to disable these protocols and/or enable them without other protocols.
2011-11-14Fixed NGX_CONF_TAKE1/NGX_CONF_FLAG misuse.Sergey Budnevitch1-1/+1
2011-10-31Fixed segfault on configuration testing with ssl (ticket #37).Maxim Dounin1-1/+10
The following config caused segmentation fault due to conf->file not being properly set if "ssl on" was inherited from the http level: http { ssl on; server { } }
2011-09-27Fix for "ssl_session_cache builtin" (broken since 1.1.1, r3993).Maxim Dounin1-2/+2
2011-08-04A new fix for the case when ssl_session_cache defined, but ssl is notIgor Sysoev1-0/+2
enabled in any server. The previous r1033 does not help when unused zone becomes used after reconfiguration, so it is backed out. The initial thought was to make SSL modules independed from SSL implementation and to keep OpenSSL code dependance as much as in separate files.
2011-07-20ECDHE supportIgor Sysoev1-1/+17
patch by Adrian Kotelba
2011-07-20MSIE export versions are rare now, so RSA 512 key is generated on demandIgor Sysoev1-3/+1
and is shared among all hosts instead of pregenerating for every HTTPS host on configuraiton phase. This decreases start time for configuration with large number of HTTPS hosts.
2011-06-27use !aNULL to disable all anonymous cipher suitesIgor Sysoev1-1/+1
patch by Rob Stradling
2010-05-14ngx_str_set() and ngx_str_null()Igor Sysoev1-2/+1
2009-10-19fix typoIgor Sysoev1-1/+1
2009-10-07use only strong ciphers by defaultIgor Sysoev1-1/+1
2009-10-06disable SSLv2 and low ciphers by defaultIgor Sysoev1-3/+2
2009-09-24$ssl_session_idIgor Sysoev1-0/+3
2009-09-18*) issue warning instead of failure: this is too common caseIgor Sysoev1-3/+4
*) use ngx_log_error(), since OpenSSL does not set an error on the failure
2009-07-23delete OpenSSL pre-0.9.7 compatibility: the sources were not actuallyIgor Sysoev1-32/+0
compatible with OpenSSL 0.9.6 since ssl_session_cache introduction
2009-07-23ssl_crlIgor Sysoev1-0/+13
2009-07-22*) $ssl_client_verifyIgor Sysoev1-1/+4
*) "ssl_verify_client ask" was changed to "ssl_verify_client optional"
2009-06-02return NULL instead of NGX_CONF_ERROR on a create conf failureIgor Sysoev1-1/+1
2009-04-16move zone name from ngx_shm_zone_t to ngx_shm_t to use Win32 shared memoryIgor Sysoev1-0/+1
2009-04-15fix building by MSVC8Igor Sysoev1-2/+2
2008-09-01*) listen sslIgor Sysoev1-12/+57
*) no default ssl_cetificate and ssl_cetificate_key
2008-07-29fix typoIgor Sysoev1-6/+6
2008-07-29*) ssl_verify_client askIgor Sysoev1-5/+24
*) test ssl_client_certificate for ssl_verify_client *) $ssl_client_cert adds TAB before each line except first one *) $ssl_client_raw_cert contains certificate as is
2008-06-16$ssl_client_certIgor Sysoev1-0/+3
2008-06-16DH parameters, ssl_dhparamIgor Sysoev1-6/+17
2008-05-26ssl_session_cache noneIgor Sysoev1-1/+6
2007-12-26ssl_session_cache offIgor Sysoev1-2/+6
2007-10-14fix English grammarIgor Sysoev1-7/+7
2007-07-17Sun Studio on sparc uses different bit orderIgor Sysoev1-3/+12
2007-05-29SNI supportIgor Sysoev1-0/+13
2007-01-03move the session cache callbacks to the ngx_openssl_moduleIgor Sysoev1-423/+10
2007-01-02ssl_session_cacheIgor Sysoev1-3/+537
2007-01-02style fix: scf > sscfIgor Sysoev1-19/+18
2007-01-02style fixIgor Sysoev1-2/+4
2007-01-02ngx_ssl_get_server_conf()Igor Sysoev1-1/+1
2006-08-09nginx-0.3.57-RELEASE importrelease-0.3.57Igor Sysoev1-67/+26
*) Feature: the $ssl_client_serial variable. *) Bugfix: in the "!-e" operator of the "if" directive. Thanks to Andrian Budanstov. *) Bugfix: while a client certificate verification nginx did not send to a client the required certificates information. *) Bugfix: the $document_root variable did not support the variables in the "root" directive.
2006-08-04nginx-0.3.56-RELEASE importrelease-0.3.56Igor Sysoev1-1/+10
*) Feature: the "dav_access" directive. *) Feature: the "if" directive supports the "-d", "!-d", "-e", "!-e", "-x", and "!-x" operators. *) Bugfix: a segmentation fault occurred if a request returned a redirect and some sent to client header lines were logged in the access log.
2006-07-28nginx-0.3.55-RELEASE importrelease-0.3.55Igor Sysoev1-1/+1
*) Feature: the "stub" parameter in the "include" SSI command. *) Feature: the "block" SSI command. *) Feature: the unicode2nginx script was added to contrib. *) Bugfix: if a "root" was specified by variable only, then the root was relative to a server prefix. *) Bugfix: if the request contained "//" or "/./" and escaped symbols after them, then the proxied request was sent unescaped. *) Bugfix: the $r->headers_in("Cookie") of the ngx_http_perl_module now returns all "Cookie" header lines. *) Bugfix: a segmentation fault occurred if "client_body_in_file_only on" was used and nginx switched to a next upstream. *) Bugfix: on some condition while reconfiguration character codes inside the "charset_map" may be treated invalid; the bug had appeared in 0.3.50.
2006-05-06nginx-0.3.45-RELEASE importrelease-0.3.45Igor Sysoev1-1/+108
*) Feature: the "ssl_verify_client", "ssl_verify_depth", and "ssl_client_certificate" directives. *) Change: the $request_method variable now returns the main request method. *) Change: the ° symbol codes were changed in koi-win conversion table. *) Feature: the euro and N symbols were added to koi-win conversion table. *) Bugfix: if nginx distributed the requests among several backends and some backend failed, then requests intended for this backend was directed to one live backend only instead of being distributed among the rest.
2006-04-19nginx-0.3.40-RELEASE importrelease-0.3.40Igor Sysoev1-4/+4
*) Feature: the ngx_http_dav_module supports the MKCOL method. *) Feature: the "create_full_put_path" directive. *) Feature: the "$limit_rate" variable.