Peer verify means the server will request the client to send a client SSL cert. You will rarely ever use this option, and if you're not sure whether you need it, then you definitely don't. Most clients (i.e. users with browsers) don't have their own personal certs. You might use it to gain access to an admin port if you gave your admins their own certs.
/s.
On Monday, Sep 22, 2003, at 16:42 US/Eastern, Andrew Piskorski wrote:
What exactly do nsopenssl's ns_param ServerPeerVerify and other ralted "*verify*" options do? Scott's online docs are helpful but they don't seem to describe this, and a look through the 2.1a sources didn't make it clear to me either.
http://www.scottg.net/webtools/aolserver/modules/nsopenssl/ configuration/
-- Andrew Piskorski <[EMAIL PROTECTED]> http://www.piskorski.com
-- AOLserver - http://www.aolserver.com/
To Remove yourself from this list, simply send an email to <[EMAIL PROTECTED]> with the body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of your email blank.
-- AOLserver - http://www.aolserver.com/
To Remove yourself from this list, simply send an email to <[EMAIL PROTECTED]> with the body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of your email blank.
