"Fossies" - the Fresh Open Source Software Archive 
Member "courier-1.2.2/libs/tcpd/README.couriertls" (20 Jan 2022, 2454 Bytes) of package /linux/misc/courier-1.2.2.tar.bz2:
As a special service "Fossies" has tried to format the requested text file into HTML format (style:
standard) with prefixed line numbers.
Alternatively you can here
view or
download the uninterpreted source code file.
1 # couriertls uses the following variables to initialize SSL/TLS:
2 #
3 # WARNING: Peer certificate verification has NOT yet been tested. Proceed
4 # at your own risk. Only the basic SSL/TLS functionality is known to be
5 # working. Keep this in mind as you play with the following variables.
6 #
7 # TLS_PROTOCOL sets the protocol version. The possible versions are:
8 #
9 # SSL2 - SSLv2
10 # SSL3 - SSLv3
11 # TLS1 - TLS1
12
13 TLS_PROTOCOL=TLS1
14
15 # TLS_CIPHER_LIST optionally sets the list of ciphers to be used by the
16 # OpenSSL library. In most situations you can leave TLS_CIPHER_LIST
17 # undefined
18 #
19 # TLS_CIPHER_LIST="ALL:!ADH:RC4+RSA:+SSLv2:@STRENGTH"
20
21 # TLS_TIMEOUT is currently not implemented, and reserved for future use.
22 # This is supposed to be an inactivity timeout, but its not yet implemented.
23
24 # TLS_DHCERTFILE - PEM file that stores our Diffie-Hellman cipher pair.
25 # When OpenSSL is compiled to use Diffie-Hellman ciphers instead of RSA
26 # you must generate a DH pair that will be used. In most situations the
27 # DH pair is to be treated as confidential, and the file specified by
28 # TLS_DHCERTFILE must not be world-readable.
29 #
30 # TLS_DHCERTFILE=
31
32 # TLS_CERTFILE - certificate to use. TLS_CERTFILE is required for SSL/TLS
33 # servers, and is optional for SSL/TLS clients. TLS_CERTFILE is usually
34 # treated as confidential, and must not be world-readable.
35 #
36 # TLS_CERTFILE=
37
38
39 # TLS_PEERCERTDIR, TLS_OURCACERT - when it is required that all peer
40 # certificates are signed by a specific certificate authority, set
41 # TLS_OURCACERT to the name of the file containing the certificate authority
42 # root key, and set TLS_PEERCERTDIR to the name of the directory containing
43 # the allowed certificates.
44 #
45 # TLS_PEERCERTDIR=
46 # TLS_OURCACERT=
47
48 #
49 # TLS_VERIFYPEER - how to verify peer certificates. The possible values of
50 # this setting are:
51 #
52 # NONE - do not verify anything
53 #
54 # PEER - verify the peer certificate, if one's presented
55 #
56 # REQUIREPEER - require a peer certificate, fail if one's not presented
57 #
58 # SSL/TLS servers will usually set TLS_VERIFYPEER to NONE. SSL/TLS clients
59 # will usually set TLS_VERIFYPEER to REQUIREPEER.
60 #
61 # TLS_VERIFYPEER=PEER
62
63 # TLS_ALLOWSELFSIGNEDCERT - this is an alternative to clients using
64 # TLS_VERIFYPEER=NONE. TLS_ALLOWSELFSIGNEDCERT ignores server certificates
65 # that are not signed by a recognized certificate authority. This allows
66 # clients to simply verify that a server certificate is available.
67 #
68 # TLS_ALLOWSELFSIGNEDCERT=1