pull/50/head
Alec Muffett 2019-11-11 22:49:13 +00:00
rodzic 2a21d074d0
commit 5a5e771c63
1 zmienionych plików z 32 dodań i 4 usunięć

Wyświetl plik

@ -100,13 +100,16 @@ rendering these issues moot.
# Proving Your Ownership To A Certificate Authority / Hardcoded Content # Proving Your Ownership To A Certificate Authority / Hardcoded Content
## IMPORTANT: if all of your "proof" URLs have DIFFERENT pathnames?
Small amounts of plain-text page content may be embedded using Small amounts of plain-text page content may be embedded using
regular-expressions for pathnames; this is done using regular-expressions for pathnames; this is done using
`hardcoded_endpoint_csv` and the following example will emit `hardcoded_endpoint_csv` and the following example will emit
`FOOPROOF` (or `BARPROOF`) for accesses to `/www/.well_known/foo` (or `FOOPROOF` (or `BARPROOF`) for accesses to `/www/.well_known/foo` or
`bar`) respectively, ignoring trailing slashes. Note the use of `../.well_known/bar` respectively, ignoring trailing slashes. Note
double-backslash to escape "dots" in the regular expression, and use the use of double-backslash to escape "dots" in the regular
of backslash-indent to continue/enable several such paths. expression, and use of backslash-indent to continue/enable several
such paths.
``` ```
# demo: CSV list to implement ownership proof URIs for EV SSL issuance # demo: CSV list to implement ownership proof URIs for EV SSL issuance
@ -115,6 +118,31 @@ set hardcoded_endpoint_csv \
^/www/\\.well_known/bar/?$,"BARPROOF" ^/www/\\.well_known/bar/?$,"BARPROOF"
``` ```
## IMPORTANT: if all your "well known" URLs have THE SAME pathname?
The `hardcoded_endpoint_csv` hack works okay if all the proof URLs are
different; but if Digicert (or whomever) give you the same pathname
(e.g. `/.well-known/pki-validation/fileauth.txt`) for all of the
onions, what do you do?
Answer: you use "splicing". If you have onion addresses named
`xxxxxxxxxxxxxxxx` and `yyyyyyyyyyyyyyyy`, then you can create files:
* `templates.d/nginx-site-xxxxxxxxxxxxxxxx.onion.conf`
* `templates.d/nginx-site-yyyyyyyyyyyyyyyy.onion.conf`
...and into each put something similar to the following incantation
- customise as necessary:
```
location ~ "^/\\.well-known/pki-validation/fileauth\\.txt$" {
return 200 "RESPECTIVE-XXX-OR-YYY-PROOF-STRING-GOES-HERE";
}
```
...then when you next `eotk config` and `eotk nxreload`, that code
should be spliced into the correct configuration for each onion.
# Demonstration And Testing # Demonstration And Testing
After installation, you can do: After installation, you can do: