I don't think client cerificates are a "strong" mean of authentication
but....
You should create one virtual host per reverse-proxy (don't forget the
Listen xxx directives...) and put these lines in your httpd.conf:

<VirtualHost _default_:xxx>
SSLEngine on
SSLCertificateFile /usr/local/apache/conf/ssl.crt/server.crt
SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/server.key
SSLCACertificateFile /usr/local/apache/conf/ssl.crt/ca-bundle.crt
SSLVerifyClient require
SSLVerifyDepth  4
SSLOptions +FakeBasicAuth +StdEnvVars

ProxyPass               /       http://your.destinatiom.host/
ProxyPassReverse        /       http://your.destination.host/

#
# Restrict access with Certificates
#
<Directory proxy:*>
    SSLRequireSSL
    AuthName "OpenSCEP"
    AuthType Basic
    AuthUserFile /usr/local/apache/auth/proxy1
    require valid-user
    Order allow,deny
    Allow from all
</Directory>
</VirtualHost>

In the file /usr/local/apache/auth/proxy1 you put one line per client
certificate as this:

CompleteDistinguishedNameInCertificate:xxj31ZMTZzkVA

If you need only to verify that the client has a certificate (from you) you
can omit the lines 2, 3, 4 and 5 after <Directory proxy:*> and be sure that
you have ONLY your CA certficate in ca-bundle.crt
Regards

Alberto Guglielmo
[EMAIL PROTECTED]
Key Fingerprint:7EAF 9E34 2838 7C6B EE47  E8F0 FFC5 3CBC 90AA 5EEE
PGP Keys at:
http://pgpkeys.mit.edu:11371



-----Messaggio originale-----
Da: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]Per conto di Mike Murray
Inviato: venerd́ 25 gennaio 2002 0.49
A: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Oggetto: SSL Proxy with Strong Authentication



*** PGP Signature Status: unknown
*** Signer: Unknown, Key ID = 0xE7BB55BE
*** Signed: 25/01/2002 0.48.38
*** Verified: 25/01/2002 10.27.05
*** BEGIN PGP VERIFIED MESSAGE ***

Hi all,

I'm investigating using Apache and SSL for (reverse) proxying HTTPS
requests;
however, one of the requirements of the task is to have a strong auth
mechanism in place.

I had two ideas, both of which have lead me to a dead end:

1.  Use the ProxyPass and ProxyPassReverse directives to authorize
connections, and requiring client certs to authenticate to the server.

2.  Using a normal SSL page to authenticate via client certs, and using an
.htaccess file in the DocRoot of the proxy server to auth IP addresses.

Both seemed likely, and both have failed.  The first because the directives
don't work as I had hoped, and the second because I can't find anywhere to
put an .htaccess file that makes sense to the <Directory proxy> section.

So, this is a two-part question: first, does anybody have any idea on how to
use .htaccess to control access to the proxy, and/or, does anybody have any
ideas on what will accomplish this task?

        Thanks,
                Mike

--
| Mike Murray                    <[EMAIL PROTECTED]>
| Scientific Technologist       http://www.nCircle.com
| nCircle Network Security

*** END PGP VERIFIED MESSAGE ***
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to