X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=doc%2Fman1%2Fopenssl-s_server.pod;h=e99d3b6a66b809c1df77810bb4416e1fd2a78e9a;hp=09eb501c37908ccea3a2997a8118682e099d0e9e;hb=8bc93d2f220de9750c6934d8d2f2346d14616180;hpb=2f0ea9365806895c313b6d8e2ce33428260e856c diff --git a/doc/man1/openssl-s_server.pod b/doc/man1/openssl-s_server.pod index 09eb501c37..e99d3b6a66 100644 --- a/doc/man1/openssl-s_server.pod +++ b/doc/man1/openssl-s_server.pod @@ -197,15 +197,14 @@ B B =head1 DESCRIPTION -The B command implements a generic SSL/TLS server which listens -for connections on a given port using SSL/TLS. +This command implements a generic SSL/TLS server which +listens for connections on a given port using SSL/TLS. =head1 OPTIONS -In addition to the options below the B utility also supports the -common and server only options documented -in the "Supported Command Line Commands" section of the L -manual page. +In addition to the options below, this command also supports +the common and server only options documented +L =over 4 @@ -258,7 +257,7 @@ anonymous cipher suite or PSK) this option has no effect. The certificate to use, most servers cipher suites require the use of a certificate and some require a certificate with a certain public key type: for example the DSS cipher suites require a certificate containing a DSS -(DSA) key. If not specified then the filename "server.pem" will be used. +(DSA) key. If not specified then the filename F will be used. =item B<-cert_chain> @@ -276,7 +275,7 @@ provided to the client. Option which determines how the subject or issuer names are displayed. The I argument can be a single option or multiple options separated by commas. Alternatively the B<-nameopt> switch may be used more than once to -set multiple options. See the L manual page for details. +set multiple options. See the L manual page for details. =item B<-naccept> I<+int> @@ -381,13 +380,14 @@ a certificate is requested. =item B<-CApath> I The directory to use for client certificate verification. This directory -must be in "hash format", see L for more information. These are -also used when building the server certificate chain. +must be in "hash format", see L for more information. +These are also used when building the server certificate chain. =item B<-chainCApath> I The directory to use for building the chain provided to the client. This -directory must be in "hash format", see L for more information. +directory must be in "hash format", see L for more +information. =item B<-chainCAfile> I @@ -423,7 +423,7 @@ web browser. Cannot be used in conjunction with B<-early_data>. Emulates a simple web server. Pages will be resolved relative to the current directory, for example if the URL https://myhost/page.html is -requested the file ./page.html will be loaded. Cannot be used in conjunction +requested the file F<./page.html> will be loaded. Cannot be used in conjunction with B<-early_data>. =item B<-tlsextdebug> @@ -434,7 +434,7 @@ Print a hex dump of any TLS extensions received from the server. Emulates a simple web server. Pages will be resolved relative to the current directory, for example if the URL https://myhost/page.html is -requested the file ./page.html will be loaded. The files loaded are +requested the file F<./page.html> will be loaded. The files loaded are assumed to contain a complete and correct HTTP response (lines that are part of the HTTP response line and headers must end with CRLF). Cannot be used in conjunction with B<-early_data>. @@ -542,8 +542,8 @@ further information). =item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-tls1_3>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>, B<-no_tls1_3> These options require or disable the use of the specified SSL or TLS protocols. -By default B will negotiate the highest mutually supported protocol -version. +By default, this command will negotiate the highest mutually supported +protocol version. When a specific TLS version is required, only that version will be accepted from the client. Note that not all protocols and flags may be available, depending on how @@ -609,7 +609,7 @@ modified. This list is combined with any TLSv1.3 ciphersuites that have been configured. When the client sends a list of supported ciphers the first client cipher also included in the server list is used. Because the client specifies the preference order, the order of the server cipherlist is irrelevant. See -the B command for more information. +L for more information. =item B<-ciphersuites> I @@ -618,16 +618,16 @@ This list is combined with any TLSv1.2 and below ciphersuites that have been configured. When the client sends a list of supported ciphers the first client cipher also included in the server list is used. Because the client specifies the preference order, the order of the server cipherlist is irrelevant. See -the B command for more information. The format for this list is a -simple colon (":") separated list of TLSv1.3 ciphersuite names. +L command for more information. The format for this list is +a simple colon (":") separated list of TLSv1.3 ciphersuite names. =item B<-dhparam> I The DH parameter file to use. The ephemeral DH cipher suites generate keys using a set of DH parameters. If not specified then an attempt is made to load the parameters from the server certificate file. -If this fails then a static set of parameters hard coded into the B -program will be used. +If this fails then a static set of parameters hard coded into this command +will be used. =item B<-attime>, B<-check_ss_sig>, B<-crl_check>, B<-crl_check_all>, B<-explicit_policy>, B<-extended_crl>, B<-ignore_critical>, B<-inhibit_any>, @@ -638,7 +638,7 @@ B<-auth_level>, B<-verify_depth>, B<-verify_email>, B<-verify_hostname>, B<-verify_ip>, B<-verify_name>, B<-x509_strict> Set different peer certificate verification options. -See the L manual page for details. +See the L manual page for details. =item B<-crl_check>, B<-crl_check_all> @@ -675,19 +675,20 @@ Note that this will only work if TLSv1.3 is negotiated. =item B<-listen> This option can only be used in conjunction with one of the DTLS options above. -With this option B will listen on a UDP port for incoming connections. +With this option, this command will listen on a UDP port for incoming +connections. Any ClientHellos that arrive will be checked to see if they have a cookie in them or not. Any without a cookie will be responded to with a HelloVerifyRequest. -If a ClientHello with a cookie is received then B will connect to -that peer and complete the handshake. +If a ClientHello with a cookie is received then this command will +connect to that peer and complete the handshake. =item B<-dtls>, B<-dtls1>, B<-dtls1_2> -These options make B use DTLS protocols instead of TLS. -With B<-dtls>, B will negotiate any supported DTLS protocol version, -whilst B<-dtls1> and B<-dtls1_2> will only support DTLSv1.0 and DTLSv1.2 -respectively. +These options make this command use DTLS protocols instead of TLS. +With B<-dtls>, it will negotiate any supported DTLS protocol +version, whilst B<-dtls1> and B<-dtls1_2> will only support DTLSv1.0 and +DTLSv1.2 respectively. =item B<-sctp> @@ -721,10 +722,10 @@ The flag B<-nextprotoneg> cannot be specified if B<-tls1_3> is used. =item B<-engine> I -Specifying an engine (by its unique id string in I) will cause B -to attempt to obtain a functional reference to the specified engine, -thus initialising it if needed. The engine will then be set as the default -for all available algorithms. +Specifying an engine (by its unique id string in I) will cause +this command to attempt to obtain a functional reference to the +specified engine, thus initialising it if needed. The engine will then be +set as the default for all available algorithms. =item B<-keylogfile> I @@ -813,8 +814,8 @@ Send a certificate request to the client (TLSv1.3 only) =head1 NOTES -B can be used to debug SSL clients. To accept connections from -a web browser the command: +This command can be used to debug SSL clients. To accept connections +from a web browser the command: openssl s_server -accept 443 -www @@ -824,20 +825,20 @@ Although specifying an empty list of CAs when requesting a client certificate is strictly speaking a protocol violation, some SSL clients interpret this to mean any CA is acceptable. This is useful for debugging purposes. -The session parameters can printed out using the B program. +The session parameters can printed out using the L command. =head1 BUGS Because this program has a lot of options and also because some of the -techniques used are rather old, the C source of B is rather hard to -read and not a model of how things should be done. +techniques used are rather old, the C source for this command is rather +hard to read and not a model of how things should be done. A typical SSL server program would be much simpler. The output of common ciphers is wrong: it just gives the list of ciphers that OpenSSL recognizes and the client supports. -There should be a way for the B program to print out details of any -unknown cipher suites a client says it supports. +There should be a way for this command to print out details +of any unknown cipher suites a client says it supports. =head1 SEE ALSO