Hi List.

(Indirect ref : previous thread "Moving from a very old Tomcat to a new Tomcat.")

Ref : http://tomcat.apache.org/connectors-doc/reference/apache.html
Item : JkExtractSSL

Do I understand this right that this parameter JkExtractSSL (default On) controls whether Tomcat receives of not the information, through mod_jk, that the original request to Apache was made via HTTPS ?

Or, in other words, that if one wanted Tomcat "not to know" and handle the current session as a normal non-secure HTTP connection, one could just set this parameter to "Off" ?

And, again in other words, if this parameter was set to Off, and Tomcat generated a new session and a JSESSIONID session cookie for this session, that the cookie would thus not be marked secure ?

---- maybe separately ----

The above refers generally to the following kind of scenario. It is also generally speaking a question to the specialists here. My purpose is to make sure I understand this whole thing correctly.

Scenario :

For whatever good reason, Apache is used as the front-end HTTP/HTTPS server and (possibly) serving some portion of the content itself, while some (or all) requests are being forwarded, through mod_jk, to a background Tomcat for content generation. For whatever good reason also, the connection between the client (browser) and Apache is a HTTPS (encrypted) connection.

The connection between the front-end Apache and the back-end Tomcat through mod_jk is never secure (the AJP protocol does not support encryption). In this scenario, it does not matter because this connection is deemed secure for other reasons (e.g. both are running on the same host, and Tomcat is set up so that it accepts only connections through Apache).

The unencrypted content, as generated and delivered by Tomcat back to Apache via mod_jk, will be forwarded back to the browser by Apache over the HTTPS connection, thus encrypted by Apache (generally speaking; in reality probably this happens in an underlying SSL connection layer).

It is possible, but not mandatory, to let Tomcat know about the HTTPS nature of the original HTTPS nature of the browser/Apache connection. This might be necessary/helpful in some scenarios (such as ?)

To let Tomcat know that the original connection is HTTPS, one uses the "JkExtractSSL On" mod_jk directive. ("On" is the default value.)
To prevent Tomcat from knowing, one uses "JkExtractSSL Off".

If "JkExtractSSL On" is used, then one may/must also pass additional HTTPS-related information from Apache to Tomcat via the "JkHTTPSIndicator", "JkCERTSIndicator", et al. directives.
This is useful/required for (?)

The general gist is that if for some reason, it is necessary to have Apache handle HTTPS connections anayway, and the connection between Apache and Tomcat is inherently secure, then there might be no reasons to "propagate" the HTTPS overhead to Tomcat, and one might as well handle it all at the Apache level.
Or am I missing something ?


Thanks,
André


---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to