aboutsummaryrefslogtreecommitdiffstats
path: root/core/certmanager.lua
Commit message (Collapse)AuthorAgeFilesLines
* certmanager: Explicitly tonumber() version number segments before doing ↵Matthew Wild2016-03-261-1/+1
| | | | arithmetic and avoid relying on implicit coercion (thanks David Favro)
* certmanager: Localize tonumberMatthew Wild2016-02-181-1/+1
|
* certmanager: Try filename.key if certificate is set to a full filename ↵Kim Alvefur2016-02-051-3/+2
| | | | ending with .crt
* certmanager: Apply global ssl config later so certificate/key is not ↵Kim Alvefur2016-02-051-1/+1
| | | | overwritten by magic
* certmanager: Support new certificate configuration for non-XMPP services too ↵Matthew Wild2016-02-051-6/+23
| | | | (fixes #614)
* core.certmanager: Look for certificate and key in a few different placesKim Alvefur2016-02-031-0/+28
|
* core.certmanager: Remove non-string filenames (allows setting eg capath to ↵Kim Alvefur2015-10-111-0/+2
| | | | false to disable the built in default)
* core.*: Remove use of module() functionKim Alvefur2015-02-211-4/+7
|
* certmanager: Fix compat for MattJs old LuaSec forkKim Alvefur2015-02-051-1/+1
|
* certmanager: Fix previous commitKim Alvefur2015-02-051-1/+1
|
* certmanager: Limit certificate chain depth to 9Kim Alvefur2015-02-051-0/+1
|
* certmanager: Options that appear to be available since LuaSec 0.2Kim Alvefur2015-02-051-3/+3
|
* certmanager: Improve "detection" of features that depend on LuaSec versionKim Alvefur2015-02-051-11/+15
|
* certmanager: Add locals for ssl.context and ssl.x509Kim Alvefur2015-02-051-3/+5
|
* certmanager: Early return from the entire module if LuaSec is unavailableKim Alvefur2015-02-051-12/+18
|
* certmanager: Make global variable access explicitMatthew Wild2015-01-201-1/+1
|
* certmanager, mod_tls: Return final ssl config as third return value (fix for ↵Kim Alvefur2014-11-221-3/+1
| | | | c6caaa440e74, portmanager assumes non-falsy second return value is an error) (thanks deoren)
* certmanager: Return final ssl config along with ssl context on successKim Alvefur2014-11-191-1/+3
|
* core.certmanager: Make create_context() support an arbitrary number of ↵Kim Alvefur2014-07-031-3/+6
| | | | option sets, merging all
* core.certmanager: Use util.sslconfigKim Alvefur2014-07-031-71/+14
|
* core.certmanager, core.moduleapi, mod_storage_sql, mod_storage_sql2: Import ↵Kim Alvefur2014-05-091-1/+1
| | | | from util.paths
* certmanager: Move ssl.protocol handling to after ssl.options is a table ↵Kim Alvefur2014-04-211-8/+9
| | | | (thanks Ralph)
* certmanager: Fix traceback if no global 'ssl' section set (thanks albert)Kim Alvefur2014-04-201-1/+3
|
* certmanager: Update ssl_compression when config is reloadedKim Alvefur2014-04-151-0/+3
|
* certmanager: Reformat core ssl defaultsKim Alvefur2014-04-151-9/+9
|
* certmanager: Support ssl.protocol syntax like "tlsv1+" that disables older ↵Kim Alvefur2014-04-151-2/+13
| | | | protocols
* certmanager: Merge ssl.options, verify etc from core defaults and global ssl ↵Kim Alvefur2014-04-151-0/+29
| | | | settings with inheritance while allowing options to be disabled per virtualhost
* certmanager: Wrap long line and add commentKim Alvefur2014-04-141-1/+5
|
* certmanager: Concatenate cipher list if given as a tableKim Alvefur2014-04-141-0/+6
|
* certmanager: Allow non-server contexts to be without certificate and keyKim Alvefur2014-04-141-2/+4
|
* certmanager: Check for non-nil values instead of true-ish values, allows ↵Kim Alvefur2014-04-141-2/+3
| | | | removing defaults
* Merge 0.9->0.10Matthew Wild2013-11-211-1/+1
|\
| * certmanager: Further cipher string tweaking. Re-enable ciphers required for ↵Matthew Wild2013-11-211-1/+1
| | | | | | | | DSA and ECDH certs/keys.
| * Back out 1b0ac7950129, as SSLv3 appears to still be in moderate use on the ↵Matthew Wild2013-11-121-1/+1
| | | | | | | | network. Also, although obsolete, SSLv3 isn't documented to have any weaknesses that TLS 1.0 (the most common version used today) doesn't also have. Get your act together clients!
* | Merge 0.9->0.10Matthew Wild2013-11-101-1/+1
|\|
| * certmanager: Update default cipher string to prefer forward-secrecy over ↵Matthew Wild2013-11-101-1/+1
| | | | | | | | cipher strength and to disable triple-DES (weaker and much slower than AES)
* | Merge 0.9->0.10Matthew Wild2013-11-091-1/+1
|\|
| * certmanager: Fix order of options, so that the dynamic option is at the end ↵Matthew Wild2013-11-091-1/+1
| | | | | | | | of the array
| * certmanager: Default to using the server's cipher preference order by ↵Matthew Wild2013-11-091-1/+1
| | | | | | | | default, as clients have been shown to commonly select weak and insecure ciphers even when they support stronger ones
* | Merge 0.9 -> 0.10Kim Alvefur2013-10-311-1/+1
|\|
| * certmanager: Disable SSLv3 by defaultKim Alvefur2013-10-311-1/+1
| |
| * certmanager: Fix dhparam callback, missing imports (Testing, pfft)Kim Alvefur2013-09-031-3/+5
| |
| * certmanager: Allow for specifying the dhparam option as a path to a file ↵Kim Alvefur2013-09-031-0/+11
| | | | | | | | instead of a callback
| * certmanager: Fix for working around a bug with LuaSec 0.4.1 that causes it ↵Matthew Wild2013-09-031-4/+4
| | | | | | | | to not honour the 'ciphers' option. This change will apply 0.9's default cipher string for LuaSec 0.4.1 users.
* | certmanager: Fix. Again.Kim Alvefur2013-10-151-2/+2
| |
* | certmanager: Add back single_dh_use and single_ecdh_use to default options ↵Kim Alvefur2013-10-151-2/+6
| | | | | | | | (Zash breaks, Zash unbreaks)
* | certmanager: Allow for specifying the dhparam option as a path to a file ↵Kim Alvefur2013-09-031-2/+17
| | | | | | | | instead of a callback
* | Remove all trailing whitespaceFlorian Zeitz2013-08-091-1/+1
| |
* | Merge 0.9->trunkMatthew Wild2013-07-131-0/+1
|\|
| * certmanager: Set our own default cipher string, which includes only ciphers ↵Matthew Wild2013-07-131-0/+1
| | | | | | | | regarded as 'HIGH' strength (by OpenSSL). In particular this disables RC4.