From aa7088cf8ae3cfe5ed6c57e9bd74eaebe5e377ec Mon Sep 17 00:00:00 2001 From: Matthew Holt Date: Wed, 6 Dec 2023 17:01:17 -0700 Subject: [PATCH] Keep on going --- new/index.html | 18 +++++++++--------- new/on-demand-tls.html | 7 +++++-- new/resources/css/common.css | 8 ++++++-- new/resources/css/home.css | 4 ++++ new/resources/css/marketing.css | 2 +- 5 files changed, 25 insertions(+), 14 deletions(-) diff --git a/new/index.html b/new/index.html index 22f1ae7..578f88f 100644 --- a/new/index.html +++ b/new/index.html @@ -227,17 +227,17 @@ Discover Caddy's automagic HTTPS features with our hosted demo.

- Point any subdomain named caddydemo to: + Point DNS records for any subdomain named caddydemo to either:

- +

+ or: +

A @@ -257,12 +257,12 @@

Not working? Make sure to use a direct subdomain of a registered domain, not a "sub-subdomain." - Verify you have created the public DNS records shown above with the correct addresses. + Verify you have created the public DNS records shown above with the correct values. You may have to allow time for propagation. Consult your DNS provider's documentation or support for assistance. - Your client must set the TLS ServerName indication (most do). + Your browser/client must set the TLS ServerName indication (most do).

- Example subdomains that could work: caddydemo.example.net, caddydemo.example.co.uk + Example subdomains that could work: caddydemo.example.net, caddydemo.example.com.au

Caddy is capable of serving TLS for any domains and IPs. This demo is intentionally restricted. diff --git a/new/on-demand-tls.html b/new/on-demand-tls.html index cdb39f1..ed0bd6b 100644 --- a/new/on-demand-tls.html +++ b/new/on-demand-tls.html @@ -60,7 +60,7 @@

1. Prevent abuse

- First, you'll configure an internal endpoint that Caddy can "ask" if a certificate should be allowed for a domain. This endpoint usually looks up the domain in a list or database and returns HTTP 200 if it's allowed. Make sure to reject domains you don't recognize. This means that customers must register their domain with your app first. + First, you'll configure an internal endpoint that Caddy can "ask" if a certificate should be allowed for a domain. This endpoint usually looks up the domain in a list or database and returns HTTP 200 if it's allowed. Make sure to reject domains you don't recognize. (This implies that customers have to tell your app what their domain is first.)

@@ -99,7 +99,7 @@

1. Point DNS records

- The customer sets a CNAME record on a domain or subdomain they control, so that their domain resolves to your domain's IP address. + The customer sets either a CNAME record or A/AAAA records on a domain or subdomain they control, so that their domain resolves to your server's IP address.