Admin Listeners are dedicated to the Admin Server. Secure (SSL) listeners are recommended for the Admin Server.
Private Key File | Certificate File | Chained Certificate | CA Certificate Path | CA Certificate File |
Protocol Version | Ciphers | Enable ECDH Key Exchange | Enable DH Key Exchange | DH Parameter |
SSL Renegotiation Protection | Enable Session Cache | Enable Session Tickets | Enable SPDY/HTTP2 |
Client Verification | Verify Depth | Client Revocation Path | Client Revocation File |
Description Every SSL listener requires a paired SSL private key and SSL certificate. Multiple SSL listeners can share the same key and certificate. |
Description The filename of the SSL private key file. The key file should not be encrypted. |
Syntax Filename which can be an absolute path or a relative path to $SERVER_ROOT. |
Tips [Security] The private key file should be placed in a secured directory that allows read-only access to the user the server runs as. |
Description The filename of the SSL certificate file. |
Syntax Filename which can be an absolute path or a relative path to $SERVER_ROOT. |
Tips [Security] The certificate file should be placed in a secured directory, which allows read-only access to the user that the server runs as. |
Description Specifies whether the certificate is a chained certificate or not. The file that stores a certificate chain must be in PEM format, and the certificates must be in the chained order, from the lowest level (the actual client or server certificate) to the highest level (root) CA. |
Syntax Select from radio box |
Description Specifies the directory where the certificates of certification authorities (CAs) are kept. Those certificates are used for client certificate authentication and constructing the server certificate chain, which will be sent to browsers in addition to the server certificate. |
Syntax path |
Description Specifies the file that contains all certificates of certification authorities (CAs) for chained certificates. This file is simply the concatenation of PEM-encoded certificate files, in order of preference. This can be used as an alternative or in addition to CA Certificate Path. Those certificates are used for client certificate authentication and constructing the server certificate chain, which will be sent to browsers in addition to the server certificate. |
Syntax Filename which can be an absolute path or a relative path to $SERVER_ROOT. |
Description Specifies which version of the SSL protocol will be used. You can choose from SSL v3.0 and TLS v1.0. Since OpenSSL 1.0.1, TLS v1.1 and TLS v1.2 are also supported. |
Tips Leaving this field blank will enable TLS v1.0, TLS v1.1, and TLS v1.2 by default. |
Description Specifies the cipher suite to be used when negotiating the SSL handshake. LSWS supports cipher suites implemented in SSL v3.0, TLS v1.0, and TLS v1.2. |
Syntax Colon-separated string of cipher specifications. |
Example ECDHE-RSA-AES128-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH |
Tips [Security] We recommend leaving this field blank to use our default cipher which follows SSL cipher best practices. |
Description Allows use of Elliptic Curve Diffie-Hellman key exchange for further SSL encryption. |
Syntax Select from radio box |
Tips [Security] ECDH key exchange is more secure than using just an RSA key. ECDH and DH key exchange are equally secure. |
Description Allows use of Diffie-Hellman key exchange for further SSL encryption. |
Syntax Select from radio box |
Tips [Security] DH key exchange is more secure than using just an RSA key. ECDH and DH key exchange are equally secure. |
Description Specifies the location of the Diffie-Hellman parameter file necessary for DH key exchange. |
Syntax Filename which can be an absolute path or a relative path to $SERVER_ROOT. |
Description Specifies whether to enable SSL Renegotiation Protection to defend against SSL handshake-based attacks. The default value is "Yes". |
Syntax Select from radio box |
Description Enables session id caching. If "Not Set", defaults to "No". (Openssl Default) |
Syntax Select from radio box |
Description Enables session tickets. If "Not Set", the server will use openSSL's default ticket. |
Syntax Select from radio box |
Description HTTP/2 and SPDY are new versions of the HTTP network protocol with the goal of reducing page load times. More information can be found at http://en.wikipedia.org/wiki/HTTP/2. |
Syntax Check the protocol(s) you wish to enable. Leaving all boxes unchecked will enable SPDY and HTTP/2 support (the default). If you wish to disable SPDY and HTTP/2, check "None" only and leave all other boxes unchecked. |
Description Specifies the type of client certifcate authentication. Available types are:
|
Syntax Select from drop down list |
Tips "None" or "Require" are recommended. |
Description Specifies how deeply a certificate should be verified before determining that the client does not have a valid certificate. The default is "1". |
Syntax Select from drop down list |
Description Specifies the directory containing PEM-encoded CA CRL files for revoked client certificates. The files in this directory have to be PEM-encoded. These files are accessed through hash filenames, hash-value.rN. Please refer to openSSL or Apache mod_ssl documentation regarding creating the hash filename. |
Syntax path |
Description Specifies the file containing PEM-encoded CA CRL files enumerating revoked client certificates. This can be used as an alternative or in addition to Client Revocation Path. |
Syntax Filename which can be an absolute path or a relative path to $SERVER_ROOT. |