From 02afa553cc33400ead38ac85f8f7f2f3fe79f49d Mon Sep 17 00:00:00 2001
From: Laurent Bercot
Date: Fri, 28 May 2021 01:05:56 +0000
Subject: Server-side SNI, libtls version
Implementation for bearssl coming soon.
---
doc/s6-tlsd-io.html | 28 ++++++++++++++++++++++++++--
1 file changed, 26 insertions(+), 2 deletions(-)
(limited to 'doc/s6-tlsd-io.html')
diff --git a/doc/s6-tlsd-io.html b/doc/s6-tlsd-io.html
index 29f75c3..b2a4a1e 100644
--- a/doc/s6-tlsd-io.html
+++ b/doc/s6-tlsd-io.html
@@ -38,7 +38,7 @@ the options given when configuring s6-networking.
Interface
- s6-tlsd-io [ -S | -s ] [ -Y | -y ] [ -v verbosity ] [ -K kimeout ] [ -d notif ] [ -- ] fdr fdw
+ s6-tlsd-io [ -S | -s ] [ -Y | -y ] [ -v verbosity ] [ -K kimeout ] [ -k snilevel ] [ -d notif ] [ -- ] fdr fdw
@@ -107,7 +107,7 @@ environment variables set:
- KEYFILE: a path to the file
containing the server's private key, DER- or PEM-encoded.
- CERTFILE: a path to the file
-containing the server's certificate, DER- or PEM-encoded.
+containing the server's certificate chain, DER- or PEM-encoded.
If PEM-encoded, the file can actually contain a chain
of certificates.
@@ -117,6 +117,17 @@ of certificates.
will refuse to run.
+
+ Alternatively, if snilevel is nonzero, the private
+key for the server named x should be held in a file
+whose name is contained in the KEYFILE:x
+environment variable, and the corresponding certificate chain
+file should be named in the CERTFILE:x
+environment variable. If snilevel is 2 or more, the
+KEYFILE and CERTFILE variables will be
+entirely ignored.
+
+
If you are using client certificates, s6-tlsd-io
also requires either one of the following variables to be set:
@@ -196,6 +207,19 @@ is not to require a client certificate at all.
to send data for kimeout milliseconds during the handshake,
close the connection. The default is 0, which means infinite timeout
(never kill the connection).
+
-k snilevel : support alternative
+certificate chains for SNI. If snilevel is nonzero, private
+key file names are read from every environment variable of the form
+KEYFILE:x, where x is a server name that
+the client may require, and a corresponding certificate chain for the name
+x should exist in the file named after the contents of the
+CERTFILE:x environment variable. If snilevel
+is 2 or more, only those files are read, and the generic
+KEYFILE and CERTFILE variables are ignored.
+If snilevel is 0, or if the option is not given, which is the
+default, KEYFILE and CERTFILE are the only private
+key / certificate chain pair that are loaded, no other environment
+variable is read for keypairs.
-d notif : handshake notification.
notif must be a file descriptor open for writing. When the
TLS handshake has completed, some data (terminated by two null
--
cgit v1.2.3