@@ -601,7 +601,7 @@ SSLEngine on
601601</example >
602602<p ><directive >SSLEngine</directive > can be set to <code >optional</code >:
603603this enables support for
604- <a href =" http ://www.ietf .org/rfc/rfc2817.txt " >RFC 2817</a >.
604+ <a href =" https ://www.rfc-editor .org/rfc/rfc2817" >RFC 2817</a >.
605605</p >
606606</usage >
607607</directivesynopsis >
@@ -653,29 +653,29 @@ The available (case-insensitive) <em>protocol</em>s are:</p>
653653 This is the Secure Sockets Layer (SSL) protocol, version 3.0, from
654654 the Netscape Corporation.
655655 It is the successor to SSLv2 and the predecessor to TLSv1, but is
656- deprecated in <a href =" http ://www.ietf .org/rfc/rfc7568.txt " >RFC 7568</a >.</p ></li >
656+ deprecated in <a href =" https ://www.rfc-editor .org/rfc/rfc7568" >RFC 7568</a >.</p ></li >
657657
658658<li ><code >TLSv1</code >
659659 <p >
660660 This is the Transport Layer Security (TLS) protocol, version 1.0.
661661 It is the successor to SSLv3 and is defined in
662- <a href =" http ://www.ietf .org/rfc/rfc2246.txt " >RFC 2246</a >.
662+ <a href =" https ://www.rfc-editor .org/rfc/rfc2246" >RFC 2246</a >.
663663 It is supported by nearly every client.</p ></li >
664664
665665<li ><code >TLSv1.1</code > (when using OpenSSL 1.0.1 and later)
666666 <p >
667667 A revision of the TLS 1.0 protocol, as defined in
668- <a href =" http ://www.ietf .org/rfc/rfc4346.txt " >RFC 4346</a >.</p ></li >
668+ <a href =" https ://www.rfc-editor .org/rfc/rfc4346" >RFC 4346</a >.</p ></li >
669669
670670<li ><code >TLSv1.2</code > (when using OpenSSL 1.0.1 and later)
671671 <p >
672672 A revision of the TLS 1.1 protocol, as defined in
673- <a href =" http ://www.ietf .org/rfc/rfc5246.txt " >RFC 5246</a >.</p ></li >
673+ <a href =" https ://www.rfc-editor .org/rfc/rfc5246" >RFC 5246</a >.</p ></li >
674674
675675<li ><code >TLSv1.3</code > (when using OpenSSL 1.1.1 and later)
676676 <p >
677677 A new version of the TLS protocol, as defined in
678- <a href =" http ://www.ietf .org/rfc/rfc8446.txt " >RFC 8446</a >.</p ></li >
678+ <a href =" https ://www.rfc-editor .org/rfc/rfc8446" >RFC 8446</a >.</p ></li >
679679
680680<li ><code >all</code >
681681 <p >
@@ -981,7 +981,7 @@ Beginning with version 2.4.7, mod_ssl makes use of
981981standardized DH parameters with prime lengths of 2048, 3072 and 4096 bits
982982and with additional prime lengths of 6144 and 8192 bits beginning with
983983version 2.4.10
984- (from <a href =" http ://www.ietf .org/rfc/rfc3526.txt " >RFC 3526</a >), and hands
984+ (from <a href =" https ://www.rfc-editor .org/rfc/rfc3526" >RFC 3526</a >), and hands
985985them out to clients based on the length of the certificate's RSA/DSA key.
986986With Java-based clients in particular (Java 7 or earlier), this may lead
987987to handshake failures - see this
@@ -2660,7 +2660,7 @@ OCSP response for a single cert. For server certificates with intermediate
26602660CA certificates in their chain (the typical case nowadays),
26612661stapling in its current implementation therefore only partially achieves the
26622662stated goal of "saving roundtrips and resources" - see also
2663- <a href =" http ://www.ietf .org/rfc/rfc6961.txt " >RFC 6961</a >
2663+ <a href =" https ://www.rfc-editor .org/rfc/rfc6961" >RFC 6961</a >
26642664(TLS Multiple Certificate Status Extension).
26652665</p >
26662666
@@ -2843,7 +2843,7 @@ One potential use is when a proxy is used for retrieving OCSP queries.</p>
28432843<usage >
28442844<p >Optionally configures a secret key for encrypting and decrypting
28452845TLS session tickets, as defined in
2846- <a href =" http ://www.ietf .org/rfc/rfc5077.txt " >RFC 5077</a >.
2846+ <a href =" https ://www.rfc-editor .org/rfc/rfc5077" >RFC 5077</a >.
28472847Primarily suitable for clustered environments where TLS sessions information
28482848should be shared between multiple nodes. For single-instance httpd setups,
28492849it is recommended to <em >not</em > configure a ticket key file, but to
0 commit comments