From d48f7ee0f8c41f2cfcab017dff8df6040eb94701 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Richard=20K=C3=B6rber?= Date: Sun, 24 Jan 2016 15:34:58 +0100 Subject: [PATCH] Fix subject term in tls-sni documentation --- src/site/markdown/challenge/tls-sni.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/site/markdown/challenge/tls-sni.md b/src/site/markdown/challenge/tls-sni.md index 354555dd..3b9a0e6a 100644 --- a/src/site/markdown/challenge/tls-sni.md +++ b/src/site/markdown/challenge/tls-sni.md @@ -26,7 +26,7 @@ KeyPair sniKeyPair = KeyPairUtils.createKeyPair(2048); X509Certificate cert = CertificateUtils.createTlsSniCertificate(sniKeyPair, subject); ``` -Now use `cert` and `sniKeyPair` to let your web server respond to a SNI request to `domain`. +Now use `cert` and `sniKeyPair` to let your web server respond to a SNI request to `subject`. The challenge is completed when the CA was able to send the SNI request and get the correct certificate in return. @@ -34,8 +34,8 @@ This shell command line may be helpful to test your web server configuration: ```shell echo QUIT | \ - openssl s_client -servername $domain -connect $server_ip:443 | \ + openssl s_client -servername $subject -connect $server_ip:443 | \ openssl x509 -text -noout ``` -It should return a certificate with `domain` set as `X509v3 Subject Alternative Name`. +It should return a certificate with `subject` set as `X509v3 Subject Alternative Name`.