|
37 | 37 | ACME protocol (<a href="https://tools.ietf.org/html/rfc8555">RFC 8555</a>). |
38 | 38 | Certificates will be renewed by the module ahead of their expiration to account |
39 | 39 | for disruption in internet services. There are ways to monitor the status of all |
40 | | - certififcates managed this way and configurations that will run your own |
| 40 | + certificates managed this way and configurations that will run your own |
41 | 41 | notification commands on renewal, expiration and errors. |
42 | 42 | </p><p> |
43 | 43 | Second, mod_md offers an alternate OCSP Stapling implementation. This works with |
@@ -495,7 +495,7 @@ MDomain example2.org auto |
495 | 495 | For testing, CAs commonly offer a second service URL. |
496 | 496 | The 'test' service does not give certificates valid in a browser, |
497 | 497 | but are more relaxed in regard to rate limits. |
498 | | - This allows for verfication of your own setup before switching |
| 498 | + This allows for verification of your own setup before switching |
499 | 499 | to the production service URL. |
500 | 500 | </p> |
501 | 501 | <example><title>LE Test Setup</title> |
@@ -1299,7 +1299,7 @@ MDMessageCmd /etc/apache/md-message |
1299 | 1299 |
|
1300 | 1300 | <directivesynopsis> |
1301 | 1301 | <name>MDCertificateCheck</name> |
1302 | | - <description>Set name and URL pattern for a certificate monitoring sitSet name and URL pattern for a certificate monitoring sitee</description> |
| 1302 | + <description>Set name and URL pattern for a certificate monitoring site.</description> |
1303 | 1303 | <syntax>MDCertificateCheck <var>name</var> <var>url</var></syntax> |
1304 | 1304 | <contextlist> |
1305 | 1305 | <context>server config</context> |
@@ -1369,7 +1369,7 @@ MDMessageCmd /etc/apache/md-message |
1369 | 1369 | <p> |
1370 | 1370 | You can configure those globally or for a specific MDomain. Since |
1371 | 1371 | these values allow anyone to register under the same account, it is |
1372 | | - adivsable to give the configuration file restricted permissions, |
| 1372 | + advisable to give the configuration file restricted permissions, |
1373 | 1373 | e.g. root only. |
1374 | 1374 | </p> |
1375 | 1375 | <p> |
@@ -1512,4 +1512,86 @@ MDMessageCmd /etc/apache/md-message |
1512 | 1512 | </usage> |
1513 | 1513 | </directivesynopsis> |
1514 | 1514 |
|
| 1515 | + <directivesynopsis> |
| 1516 | + <name>MDCheckInterval</name> |
| 1517 | + <description>Determines how often certificates are checked</description> |
| 1518 | + <syntax>MDCheckInterval <var>duration</var></syntax> |
| 1519 | + <default>MDCheckInterval 12h</default> |
| 1520 | + <contextlist> |
| 1521 | + <context>server config</context> |
| 1522 | + </contextlist> |
| 1523 | + <compatibility>Available in version 2.4.60 and later</compatibility> |
| 1524 | + <usage> |
| 1525 | + <p> |
| 1526 | + The time between certificate checks. By default, the validity |
| 1527 | + and need for renewals is checked twice a day. This interval is |
| 1528 | + not followed precisely. Instead the module randomly applies |
| 1529 | + a +/-50% jitter to it. With the default of 12 hours, this |
| 1530 | + means the actual time between runs varies between 6 and 18 |
| 1531 | + hours, jittered anew every run. This helps to mitigate |
| 1532 | + traffic peaks at ACME servers. |
| 1533 | + </p><p> |
| 1534 | + The minimum duration you may configure is 1 second. It is |
| 1535 | + not recommended to use such short times in production. |
| 1536 | + </p> |
| 1537 | + </usage> |
| 1538 | + </directivesynopsis> |
| 1539 | + |
| 1540 | + <directivesynopsis> |
| 1541 | + <name>MDProfile</name> |
| 1542 | + <description>Use a specific ACME profile from the CA</description> |
| 1543 | + <syntax>MDProfile name</syntax> |
| 1544 | + <contextlist> |
| 1545 | + <context>server config</context> |
| 1546 | + </contextlist> |
| 1547 | + <compatibility>Available in version 2.4.64 and later</compatibility> |
| 1548 | + <usage> |
| 1549 | + <p> |
| 1550 | + This about a non-standard ACME extension by Let's Encrypt. |
| 1551 | + </p><p> |
| 1552 | + Lets Encrypt announced they will add Certificate Profiles |
| 1553 | + support in their CA during 2025, beginning with their staging |
| 1554 | + servers. This, among some other details, let's you select the |
| 1555 | + lifetime of the certificates you get. The "default" profile |
| 1556 | + will keep the 90 days and a "tlsserver" profile will issue |
| 1557 | + certificates with only 6 days of validity. |
| 1558 | + </p><p> |
| 1559 | + If you do not change your mod_md configuration, you will |
| 1560 | + continue to get the 90 days certificates. Should you believe |
| 1561 | + that a shorter lifetime is beneficial for you (and take the |
| 1562 | + risk that the renewal time is way shorter), |
| 1563 | + you can configure the profile to use via 'MDProfile tlsserver'. |
| 1564 | + </p><p> |
| 1565 | + The profile names are defined by the CA. If a profile you |
| 1566 | + configure is not available, no profile will be used and |
| 1567 | + the certificate will be issue according to what the CA |
| 1568 | + considers default. |
| 1569 | + </p><p> |
| 1570 | + See <directive module="mod_md">MDProfileMandatory</directive> |
| 1571 | + on how to disable defaults for profiles. |
| 1572 | + </p> |
| 1573 | + </usage> |
| 1574 | + </directivesynopsis> |
| 1575 | + |
| 1576 | + <directivesynopsis> |
| 1577 | + <name>MDProfileMandatory</name> |
| 1578 | + <description>Control if an MDProfile is mandatory.</description> |
| 1579 | + <syntax>MDProfileMandatory on|off</syntax> |
| 1580 | + <default>MDProfileMandatory off</default> |
| 1581 | + <contextlist> |
| 1582 | + <context>server config</context> |
| 1583 | + </contextlist> |
| 1584 | + <usage> |
| 1585 | + <p> |
| 1586 | + Controls if a <directive module="mod_md">MDProfile</directive> |
| 1587 | + you configure is mandatory or not. When mandatory and the CA |
| 1588 | + does not offer a configured profile, the certificate |
| 1589 | + renewal will fail. |
| 1590 | + </p><p> |
| 1591 | + When not mandatory and a profile is not offered by the CA, |
| 1592 | + renewals will be performed without specifying a profile and |
| 1593 | + the CA will issue a certificates according to its defaults. |
| 1594 | + </p> |
| 1595 | + </usage> |
| 1596 | + </directivesynopsis> |
1515 | 1597 | </modulesynopsis> |
0 commit comments