Classification: UNCLASSIFIED
Caveats: NONE
Hi Vianney,
"When i go to http://server/, it redirects to https://server/ and i have a
404 error."
This is happening because you have this:
RewriteEngine on
RewriteRule ^.*$ https://%{SERVER_NAME}%{REQUEST_URI} [L,R]
in your m
Classification: UNCLASSIFIED
Caveats: NONE
Hello Arsen,
If you're using mod_ssl/OpenSSL on Linux, I know you can use the c_rehash
command to automatically create the required symoblic links. On my install,
c_rehash is in the /usr/local/bin directory.
Hope that helps,
Dwight...
---
Dwight V
: OCSP? (UNCLASSIFIED)
http://www.belgium.be/zip/eid_authentication_proxy_fr.html
You will find there an updated version of mod-ssl including OCSP check as
well as the documentation to set it up.
2006/10/11, Victor, Dwight P CTR DISA PAC <[EMAIL PROTECTED]>:
> Classification: UNC
nesday, October 11, 2006 4:32 PM
> To: modssl-users@modssl.org
> Subject: Re: OCSP? (UNCLASSIFIED)
>
>
> My organization is headed down this road after experiencing
> performance degradation from checking large CRLs. As we come up with a
> solution, will post what I find out.
Classification: UNCLASSIFIED
Caveats: NONE
Hello List!
Has anyone had any experience/success with using mod_ssl + Apache v2 to
query an OCSP responder regarding the status of an end-user provided
certificate and allow/deny access based on the response? Any tips,
suggestions, discussion would
Hi Rob,
I also work for the DoD and am using the same CRLs as you (downloaded and
converted on a daily basis). We're running a Linux webserver with a single
1.8Ghz Celeron, 512MB of RAM, and 1GB of swap.
I haven't noticed any memory issues when checking CRLs.
My Apache server starts multiple ch
Hi Phil,
As far as I know, nothing that Rob mentioned is classified...especially
since he is not naming systems by name or address. The fact that the DoD
uses certificates is no secret...there's been many writeups in the various
trade magazines regarding the DoD's push to PKI.
Dwight...
-Or