Skip to content

Commit 4579951

Browse files
committed
Fix typos in SNI documentation
1 parent cc1f33e commit 4579951

File tree

2 files changed

+15
-15
lines changed

2 files changed

+15
-15
lines changed

doc/yaws.tex

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2687,18 +2687,18 @@ \section{Global Part}
26872687
especially the same SSL certificate. Only the HTTP Host header
26882688
will be considered to find the right virtual server.
26892689

2690-
When enabled, SSL configuration can be different from a virtual
2691-
server to another, each one can have its own SSL certificate. In
2690+
When enabled, SSL configuration can be different from one virtual
2691+
server to another; each one can have its own SSL certificate. In
26922692
this case, if a client provides a SNI hostname, it will be used to
26932693
find the right virtual server. To accept the SNI information from
2694-
the client, The first virtual server (the default one, see
2695-
\verb+pick_first_virthost_on_nomatch+) \textbf{must} include TLS
2696-
as a permitted protocol.
2694+
the client, the first virtual server---the default one, see
2695+
\verb+pick_first_virthost_on_nomatch+---\textbf{must} include
2696+
TLS as a permitted protocol.
26972697

26982698
If \verb+sni+ directive is set to \textit{enable}, non SNI clients
26992699
are allowed. For such clients, virtual servers are selected as if
27002700
Yaws did not have SNI support. If it is set to \textit{strict},
2701-
SNI hostname is mandatary to access a SSL virtual server. But, in
2701+
SNI hostname is mandatory to access a SSL virtual server. But in
27022702
all cases, when SNI support is enabled, if a client provides a SNI
27032703
hostname, it \textbf{must} match the HTTP Host header (which is
27042704
mandatory too). Note that the first virtual server (the default
@@ -2710,7 +2710,7 @@ \section{Global Part}
27102710
any different from using virtual servers without SNI support.)
27112711

27122712
The \verb+sni+ directive is a global one, so if you set it to
2713-
\textit{strict}, non SNI clients will be refused for \textbf{all}
2713+
\textit{strict}, non-SNI clients will be refused for \textbf{all}
27142714
SSL groups. See \verb+require_sni+ directive from the server part
27152715
to mitigate this requirement.
27162716

man/yaws.conf.5

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -368,17 +368,17 @@ IP/Port) must share the same SSL configuration, especially the same SSL
368368
certificate. Only the HTTP Host header will be considered to find the right
369369
virtual server.
370370

371-
When enabled, SSL configuration can be different from a virtual server to
372-
another, each one can have its own SSL certificate. In this case, if a client
371+
When enabled, SSL configuration can be different from one virtual server to
372+
another; each one can have its own SSL certificate. In this case, if a client
373373
provides a SNI hostname, it will be used to find the right virtual server. To
374-
accept the SNI information from the client, The first virtual server (the
375-
default one, see \fBpick_first_virthost_on_nomatch\fR) \fBmust\fR include TLS as
374+
accept the SNI information from the client, the first virtual server -- the
375+
default one, see \fBpick_first_virthost_on_nomatch\fR -- \fBmust\fR include TLS as
376376
a permitted protocol.
377377

378378
If \fBsni\fR directive is set to \fIenable\fR, non SNI clients are allowed. For
379379
such clients, virtual servers are selected as if Yaws did not have SNI
380-
support. If it is set to \fIstrict\fR, SNI hostname is mandatary to access a SSL
381-
virtual server. But, in all cases, when SNI support is enabled, if a client
380+
support. If it is set to \fIstrict\fR, SNI hostname is mandatory to access a SSL
381+
virtual server. But in all cases, when SNI support is enabled, if a client
382382
provides a SNI hostname, it \fBmust\fR match the HTTP Host header (which is
383383
mandatory too). Note that the first virtual server (the default one) will be
384384
used for any request where the provided SNI hostname doesn't match any of
@@ -387,8 +387,8 @@ most restrictive access control, otherwise clients can access restricted
387387
resources by sending a request for any unknown hostname. (This isn't actually
388388
any different from using virtual servers without SNI support.)
389389

390-
The \fBsni\fR directive is a global one, so if you set it to \fIstrict\fR, non
391-
SNI clients will be refused for \fBall\fR SSL groups. See \fBrequire_sni\fR
390+
The \fBsni\fR directive is a global one, so if you set it to \fIstrict\fR,
391+
non-SNI clients will be refused for \fBall\fR SSL groups. See \fBrequire_sni\fR
392392
directive from the server part to mitigate this requirement.
393393

394394
Default is \fIdisable\fR.

0 commit comments

Comments
 (0)