I have read many posts about the inability to use virtual host names with ssl. My
firewall uses NAT, and only allows one LAN IP to receive requests for httpd on ports
80 and 443. Given that I can have multiple IP's on one NIC (i'm running Redhat Linux
7.2) and that I can setup my internal DNS (which the firewall uses) such that:
SITE IP
-----------------------
www.site1.org 192.168.0.1
www.site2.com 192.168.0.2
www.site3.net 192.168.0.3
...
And putting the following in my httpd.conf:
NameVirtualHost 192.168.0.1:80
NameVirtualHost 192.168.0.1:443
NameVirtualHost 192.168.0.2:80
NameVirtualHost 192.168.0.2:443
<VirtualHost 192.168.0.1:80>
ServerName www.site1.org
...
</VirtualHost>
<VirtualHost 192.168.0.1:443>
ServerName www.site1.org
...
SSLCertificateFile ...
SSLCertificateKeyFile ...
</VirtualHost>
<VirtualHost 192.168.0.2:80>
ServerName www.site2.com
...
</VirtualHost>
<VirtualHost 192.168.0.2:443>
ServerName www.site2.com
...
SSLCertificateFile ...
SSLCertificateKeyFile ...
</VirtualHost>
Assuming that the firewall sends httpd requests to 192.168.0.1, is it possible for
apache to be configured to handle requests made to www.site2.com/192.168.0.2? Or can I
accomplish what I desire by using some sort of proxy that receives all httpd requests
from the firewall and then connects to my apache server.
I guess my bottom line question is - can I use internal IP addresses to use multiple
ssl-enabled virtual hosts, and if so, how?
Regards,
Michael
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]