@@ -1124,9 +1124,10 @@ \section{Server Name Indication}
11241124certificate to clients. Possible solutions are listed here:
11251125\url {http://wiki.cacert.org/VhostTaskForce}.
11261126
1127- By default, SNI is disabled in \Yaws \ to be backward compatible with old
1128- Erlang/OTP releases. But it can be enabled and fine tuned for each SSL
1129- servers. Here is a basic example:
1127+ By default, SNI was originally disabled in \Yaws \ to be backward
1128+ compatible with old Erlang/OTP releases; it remains disabled by
1129+ default to remain compatible with older \Yaws \ releases. But it can be
1130+ enabled and fine-tuned for each SSL server. Here is a basic example:
11301131
11311132
11321133\begin {verbatim }
@@ -1156,11 +1157,11 @@ \section{Server Name Indication}
11561157
11571158Depending on the SNI hostname provided by the client, the first or the
11581159second virtual host will be chosen, and the corresponding SSL
1159- certificate will be presented to the client. In this example, non SNI
1160+ certificate will be presented to the client. In this example, non- SNI
11601161clients are still supported. For such clients, the SSL certificate of
11611162the first virtual server will be presented and the HTTP Host header will
1162- be then used to find the correct virtual server. Otherwise, it is
1163- possible to refuse non SNI clients, globally or per server.
1163+ then be used to find the correct virtual server. Otherwise, it is
1164+ possible to refuse non- SNI clients, globally or per server.
11641165
11651166
11661167\chapter {Applications }
@@ -2695,7 +2696,7 @@ \section{Global Part}
26952696 \verb +pick_first_virthost_on_nomatch +---\textbf {must } include
26962697 TLS as a permitted protocol.
26972698
2698- If \verb +sni + directive is set to \textit {enable }, non SNI clients
2699+ If the \verb +sni + directive is set to \textit {enable }, non- SNI clients
26992700 are allowed. For such clients, virtual servers are selected as if
27002701 Yaws did not have SNI support. If it is set to \textit {strict },
27012702 SNI hostname is mandatory to access a SSL virtual server. But in
@@ -2707,7 +2708,10 @@ \section{Global Part}
27072708 that the first virtual server have the most restrictive access
27082709 control, otherwise clients can access restricted resources by
27092710 sending a request for any unknown hostname. (This isn't actually
2710- any different from using virtual servers without SNI support.)
2711+ any different from using virtual servers without SNI support.) If
2712+ you're using self-signed certificates, be sure to also set the
2713+ \verb +depth + configuration variable to 0 to avoid following
2714+ certificate chains.
27112715
27122716 The \verb +sni + directive is a global one, so if you set it to
27132717 \textit {strict }, non-SNI clients will be refused for \textbf {all }
@@ -3441,9 +3445,10 @@ \section{Server Part}
34413445 \item \verb +depth = Int + --- Specifies the depth of certificate
34423446 chains the server is prepared to follow when verifying client
34433447 certs. For the OTP new SSL implementation it is also used to
3444- specify how far the server, i.e. we, shall follow the SSL
3445- certificates we present to the clients. Hence, using self
3446- signed certs, we typically need to set this to 0.
3448+ specify how far the server (\Yaws \ in our case) shall
3449+ follow the SSL certificates we present to the clients. Hence,
3450+ using self-signed certificates, we typically need to set this
3451+ to 0.
34473452
34483453 \item \verb +password = String + --- If the private key is
34493454 encrypted on disk, this password is the 3des key to decrypt it.
@@ -3508,7 +3513,7 @@ \section{Server Part}
35083513\end {verbatim }
35093514
35103515 \item \verb +require_sni = true | false + ---
3511- If \textit {true }, the server will reject non SNI clients and
3516+ If \textit {true }, the server will reject non- SNI clients and
35123517 clients providing an unknown SNI hostname (this last remark
35133518 is only relevant for the first virtual server of a SSL
35143519 group). This directive is ignored if SNI support is disabled
0 commit comments