problem with SSL installation??

2001-07-11 Thread ganesh kumar godavari

hello everyone,
 i want the apache server to serve listen only on port 443(i.e https) and not 
on port 80(www request) i.e apache server should serve only ssl requests by not acting 
as a virtual host.

i followed the instruction given in

http://www.modssl.org/example/
i have installed with a few changes like
1) after performing step 3 i removed all the AddModule statements from the 
apache_1.3.20/src/Configuration file

i resumed all the remaining steps given.

in the module.c i still see other modules specified, how can i over come it???.

idea ??
inorder to overcome other modules being specified i manually edited the 
modules.c(though strictly prohibited) and removed all modules except ssl_module 
preformed the steps 
1) make 2) make certificate 3) make install 

there was no error reported so i am very happy.

damn its a failure!!
i am getting the error the following error on starting apache with ssl.
$./apachectl startssl
Syntax error on line 52 of /home/gkgodava/testapache/conf/httpd.conf:
Invalid command 'ServerType', perhaps mis-spelled or defined by a module not included 
in the server configuration
/home/gkgodava/testapache/bin/apachectl startssl: httpd could not be started

line 52 happens to be servertype which is standalone(no spelling mistake)

Reason??
i donot know what are the core modules necessary for the basic working of apache?. if 
any one knows please let me know.

Thanks a lot
ganesh


Buy Feng Shui Package for Rs. 151/- only, at 
http://shopping.rediff.com/shopping/fengshui_mailer.htm



__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



RE: Reverse Proxy SSL

2001-07-11 Thread David Rees



#3.  People who have done it are too busy to 
reply.
 
I've 
done it before to get mod_gzip working under mod_ssl.  Unfortunately, I 
don't have a sample config handy.  Search the mod_gzip archives and you 
should find your answer.
 
-Dave

  -Original Message-From: 
  [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On 
  Behalf Of Roy PreeceSent: Wednesday, July 11, 2001 4:52 
  AMTo: [EMAIL PROTECTED]Subject: Reverse Proxy 
  SSL
  OK, from the lack of response to my 
  previous email  (SSLClient Browser <--> Apache Proxypassreverse 
  <--> https://192.168.xxx.xxx) I 
  can deduce one of two cases is true.
   
  1. Nobody has successfully achieved a 
  reverse proxy of SSL in the way I am describing, (Hard to 
believe)
  or...
  2. You are really sick of this 
  question.(Sorry)
   
  If you chose 2, I have read through all of 
  the mail archives on this list and others with regard to reverse proxying 
  https. The most popular 
  config seems to be to run SSL between the browser and the proxy server 
  and then plain old http between the proxy server and the backend private 
  servers. However, I want the client 
  browser to use a cert to authenticate directly on the back end server on a 
  private network, therefore I just want the reverse proxy to pass the encrypted 
  traffic back and forth.
   
  Is this 
  possible..How? Tips and pointers greatly 
  appreciated.
   
  TIA,
   
  Roy Preece
   


SSL Authentication Issues

2001-07-11 Thread Chompsky Turing

Let me propose the following hypothetical situation. I am running a 
apache/mod_ssl server (or anyother server for that matter) with a secure 
directory that requies client authentication. Two types of clients access 
this directory. There is a group of clients that only trust Verisign as a 
CA, and a group that only trusts Thwart as a CA. I have certificates signed 
by both CAs. Is there a way to set my server up so that it can send the 
correct certificate to every client? I believe the answer is no, but I 
thought I would check just in case. Perhaps there exists some sort of work 
around. Thanks.

Chompsky



_
Get your FREE download of MSN Explorer at http://explorer.msn.com

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Reverse Proxy SSL

2001-07-11 Thread Roy Preece



OK, from the lack of response to my previous 
email  (SSLClient Browser <--> Apache Proxypassreverse <--> https://192.168.xxx.xxx) I can deduce one of 
two cases is true.
 
1. Nobody has successfully achieved a 
reverse proxy of SSL in the way I am describing, (Hard to believe)
or...
2. You are really sick of this 
question.(Sorry)
 
If you chose 2, I have read through all of 
the mail archives on this list and others with regard to reverse proxying https. 
The most popular config seems to be 
to run SSL between the browser and the proxy server and then plain old http 
between the proxy server and the backend private servers. However, I want the client browser to use a cert to 
authenticate directly on the back end server on a private network, therefore I 
just want the reverse proxy to pass the encrypted traffic back and 
forth.
 
Is this 
possible..How? Tips and pointers greatly 
appreciated.
 
TIA,
 
Roy Preece
 


Re: Apache don't start with SSL

2001-07-11 Thread Joachim Schubert

Mads Toftum wrote:

> 
> SSL_BASE should point to /usr/local/ssl - not to the openssl binary.
>

Ohhh! I 've solved with your help.

Thanks a lot.

Joachim 
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]



Re: Does this CA process make sense?

2001-07-11 Thread Lutz Jaenicke

On Tue, Jul 10, 2001 at 06:12:09PM -0400, Dan Langille wrote:
...
> I imported iestuff.p12 into my MSIE browser and select that certificate 
> when prompted by the browser.
> 
> I then used the following SSL related values in my SSL vhost:
> 
> SSLEngine   on
> SSLCertificateFile  /home/dan/CA/demoCA/cacert.pem
> SSLCertificateKeyFile   /home/dan/CA/demoCA/private/cakey.key
> 
> SSLCACertificatePath/home/dan/CA/demoCA/
> SSLCACertificateFile/home/dan/CA/demoCA/cacert.pem
> 
> 
> SSLVerifyClient require
> SSLVerifyDepth  1
> 
> 
> Note that I'm using the CA certificate and key for the SSL and the 
> SSLCA information.  Does that make sense?  I tried this:
> 
> SSLCACertificatePath/home/dan/CA/
> SSLCACertificateFile/home/dan/CA/newcert.pem
> 
> But if I use that combination, my browser certificate is not listed in the 
> "Client Authentication" dialog box presented by the browser when I go 
> to /securelocation.
> 
> Why?  What have I misunderstood?

You should use three distinct certificates (and corresponding private keys):
* The CA certificate. You already have one, use it with SSLCACertificateFile
* The server's certificate. You don't have one by now. Create a new one
  signed from your CA. Issue it for CommonName (CN) being the FQDN
  (fully qualified domain name) of your server: Use it with
  mv newkey.pem server_key.pem
  mv newcert.pem server_cert.pem
  SSLCertificateFile /path/to/server_cert.pem
  SSLCertificateKeyFile /path/to/server_key.pem
* The client key. You already put it into iestuff.p12...

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
BTU Cottbus   http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus  Fax. +49 355 69-4153
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]