k. Getting support for STARTTLS into
Apache is only the first step - so far no clients support it yet.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
uple of times
then this is the sort of document you need IMHO.
Short, concise and more of a reference is the way to go, and it makes
life simpler for someone like me who admins apache more than mod_perl.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
> the cert info in headers) and there's no such thing as an SSL
> proxy module that I've been able to find.
>
I did make a module like that last year - it is available from
http://www2.toftum.dk/apache/
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
is quite simple - just configure it
to allow the weak ciphers, and then limit actual access by using SSLRequire
to allow only >= 128 bits encryption.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
or RSAREF was removed from mod_ssl in
version 2.7.0-1.3.14 because there is no reason to use it at all.
Just rebuild your openssl without RSAREF.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
-
ing hardware
accelerator support which might end up giving us some cheaper
hw options in the future.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
having to set
up the session from scratch.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
Take a look at ftp://ftp.netcetera.dk/pub/apache/mod_proxy_add_forward.c
It could be a way to solve your problem.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
ice for such a setup - I usually end up with a mix
of proxy and rewrite to get the job done.
Lots of examples are available in http://www.apache.org/docs/misc/rewriteguide.html
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
tp://intranet_host/"> would be a problem.
vh
Mads Toftum, QDPH
ternal machine through the firewall is restricted to one
simple rule in the FW machine and that it can be easily protected with
encryption/authentication.
This probably doesn't answer your question ;-) But I hope that at least
the idea is useful.
vh
Mads Toftum, QDPH
11 matches
Mail list logo