Sponsored Content
Top Forums UNIX for Advanced & Expert Users Apache ssl questions for experts Post 302213788 by elvis00 on Friday 11th of July 2008 03:56:28 AM
Old 07-11-2008
Hi,

here my configuration:

The simple question is. Is this possible or not?


----------------------



#SSL PORT 1, LISTENS ON BOTH INTERFACES TO MAKE A LATER MIGRATION EASIER
Listen web1.service.de2.sp.somecompany.com:58401
Listen web1-fe.service.de2.sp.somecompany.com:58401
NameVirtualHost web1.service.de2.sp.somecompany.com:58401
NameVirtualHost web1-fe.service.de2.sp.somecompany.com:58401


#SSL PORT 2, LISTENS ON BOTH INTERFACES TO MAKE A LATER MIGRATION EASIER
Listen web1-fe.service.de2.sp.somecompany.com:58406
Listen web1.service.de2.sp.somecompany.com:58406
NameVirtualHost web1.service.de2.sp.somecompany.com:58406
NameVirtualHost web1-fe.service.de2.sp.somecompany.com:58406

######################################################################
###
### Host for HTTPS access
###

<VirtualHost web1.service.de2.sp.somecompany.com:58401 web1-fe.service.de2.sp.somecompany.com:58401>

ServerName service-lit-uk.sp.somecompany.com

SSLEngine on

LogLevel warn

ErrorLog "|/opt/SP/apacheas/current/bin/rotatelogs \
/opt/SP/apacheas/current/logs/http_error_58401_log.%Y%m%d%H%M 600 120"

CustomLog "|/opt/SP/apacheas/current/bin/rotatelogs \
/opt/SP/apacheas/current/logs/http_access_58401_log.%Y%m%d%H%M 600 120" combined

SetEnvIf User-Agent ".*MSIE.*" \
nokeepalive ssl-unclean-shutdown \
downgrade-1.0 force-response-1.0

ProxyPass / http://l1-v10.service.de2.sp.somecompany.com:8081/
ProxyPassReverse / http://l1-v10.service.de2.sp.somecompany.com:8081/
ProxyHTMLURLMap http://l1-v10.service.de2.sp.somecompany.com:8081/ /
RequestHeader unset Accept-Encoding

SSLCertificateFile /opt/SP/apacheas/current/conf/service-uk.crt/service-uk.cer
SSLCertificateKeyFile /opt/SP/apacheas/current/conf/service-uk.crt/service-uk.key
SSLProtocol -all +TLSv1 +SSLv3

</VirtualHost>

##################################
###
### Host for OTHER Trigger
###
<VirtualHost web1.service.de2.sp.somecompany.com:58406 web1-fe.service.de2.sp.somecompany.com:58406>

ServerName service-lit-uk.sp.somecompany.com

SSLEngine on

LogLevel warn

ErrorLog "|/opt/SP/apacheas/current/bin/rotatelogs \
/opt/SP/apacheas/current/logs/http_error_58406.%Y%m%d%H%M 600 120"

CustomLog "|/opt/SP/apacheas/current/bin/rotatelogs \
/opt/SP/apacheas/current/logs/http_access_58406.%Y%m%d%H%M 600 120" combined

SetEnvIf User-Agent ".*MSIE.*" \
nokeepalive ssl-unclean-shutdown \
downgrade-1.0 force-response-1.0

RequestHeader unset Accept-Encoding

ProxyPass / http://l1-v10.service.de2.sp.somecompany.com:8050/
ProxyPassReverse / http://l1-v10.service.de2.sp.somecompany.com:8050/
ProxyHTMLURLMap http://l1-v10.service.de2.sp.somecompany.com:8050/ /

SSLCertificateFile /opt/SP/apacheas/current/conf/service-uk.crt/service-uk.cer
SSLCertificateKeyFile /opt/SP/apacheas/current/conf/service-uk.crt/service-uk.key
SSLCACertificateFile /opt/SP/apacheas/current/conf/service-uk.crt/ca.cer
SSLProtocol -all +TLSv1 +SSLv3

</VirtualHost>

------------------------------------
 

10 More Discussions You Might Find Interesting

1. Solaris

Apache with SSL problem

Hi All, I'm attempting to build Apache 1.3.27 on a new Solaris 9 system. I am using following "Option 2" in the INSTALL of the mod_ssl-2.8.12-1.3.27, and I'm stumped. After I configure and make all the required components the make of the Apache server itself stops at: flex... (2 Replies)
Discussion started by: b_manu78
2 Replies

2. HP-UX

Apache and SSL

When everytime I start apache, it asks me to enter pass phrase, and I have to enter the pass phrase manually. I would like to write a script to monitor the apache, such that it will check the apache status, if it is stopped, then start it automatically. However, the script fails since the pass... (1 Reply)
Discussion started by: alfredo
1 Replies

3. UNIX for Dummies Questions & Answers

Unix Experts Answer this INterview Questions please

1, why Boot server should be in a network in jumpstart? 2, what is the different between patch and package? 3, how to list the avilable NIC in solaris9? 4, User complaing system is slow (solaris) what are the steps to check? 5, what is hardware error and software error and Transport Error? in... (5 Replies)
Discussion started by: suresh_krish
5 Replies

4. Solaris

SSL key Apache

We are running Apache 1.3 on solaris 8 we have renewed our ssl key with verisign. They have confirmed renewel and new ssl certifcate is appended to the end of the email. out apache config file has two directives SSLCertificateFile /export/home/apache/conf/ssl.crt/xxxx.crt SSLCertificationKeyFile... (2 Replies)
Discussion started by: Tirmazi
2 Replies

5. Web Development

Apache SSL Help

I had to update the CA Trusted Chains on two different UNIX servers running Apache. After looking through some documentation, it said that after the new CA's were installed, I had to run the /usr/ccs/bin/make command in order to create the symbolic links for apache to recognize the certs. On the... (1 Reply)
Discussion started by: camerodity
1 Replies

6. Web Development

apache ssl routing 2 dns

Hi i'm looking for some advice on apache ssl routing for 2 url.Fyi one url is certificate is verified by GeoTrust and another url on the other site certificate is verified by Verisgn.Is that possible to routing between this two url. Here is my scenario I have an https:// site running on an... (0 Replies)
Discussion started by: netxus
0 Replies

7. Web Development

Apache, cgi script run twice when ssl, once when not ssl

I have interesting problem. https:/host/some/x.cgi - this script has run twice when I call this url But http:/host/some/x.cgi work fine, only once. Output is text/plain. If I change output format to the Content-type text/html, then both urls works fine - executed only once. (2 Replies)
Discussion started by: kshji
2 Replies

8. IP Networking

configure apache to work with ssl

Hi, I need help to configure the apache to work with ssl. I have managed to create self-signed certificate according to the instruction in the following link. So I have the crt file and the key file. however when I add: <Virtualhost *:443> SSLEngine on ... (1 Reply)
Discussion started by: programAngel
1 Replies

9. Shell Programming and Scripting

Couple of easy questions for experts on awk/sed

Hello Experts.. I have 3-4 C codes with Oracle SQL statements embedded. All the SQL statements starts with EXEC SQL keyword and ends with ;. I want to extract all the SQL statements out of these codes. I did awk '/^EXEC SQL/,/\;/' inputFile (I use this on all of the codes individually). That... (2 Replies)
Discussion started by: juzz4fun
2 Replies

10. Linux

Apache wildcard ssl on subdomain serves same page for non ssl virtualhosts

Issue observed: I have configured ng.my-site.com using widlcard ssl cert. When I hit https://www.my-site.com it loads ng.my-site.com website! please advise if I missed any concept / configs... Thank you! httpd.conf <VirtualHost *:80> ServerName www.my-site.com ServerAdmin... (0 Replies)
Discussion started by: ashokvpp
0 Replies
SSLCLIENT(1)						       DACS Commands Manual						      SSLCLIENT(1)

NAME
sslclient - an SSL client SYNOPSIS
sslclient [dacsoptions[1]] [-caf | --ca_cert_file filename] [-cad | --ca_cert_dir dirname] [-ccf | --cert_chain_file filename] [-C | --ciphers cipherstring] [[-dvp] | [--default_verify_paths] cipherstring] [-h | --help] [-kf | --key_file filename] [-kft | --key_file_type pem | asn1] [-p | -sp | [--server_port] portnum] [-r | --random filename] [[-sm | --server_match regex ]...] [-vd | --verify_depth depth] [-vt | --verify_type none | peer] [--] server [:port ] DESCRIPTION
This program is part of the DACS suite. It can be used with the usual DACS command line options (dacsoptions[1]), provided they all appear before the program-specific flags (note that the -un flag can be used to suppress configuration file processing). sslclient is also used by the http(1)[2] command and by requests generated internally by DACS components. The sslclient utility acts as an SSL client. After establishing a bidirectional SSL connection with an SSL server, it forwards its standard input to the SSL server and writes data produced by the SSL server to sslclient's standard output. sslclient connects to server (a domain name or IP address). If a port number suffix is given (port), it is used; otherwise, if a port number is specified as a separate command line argument (--server_port portnum), that is used; failing that, the default SSL port for https (443)[3] is used. The program reads from its standard input and the server asynchronously (using non-blocking I/O). Note that the server side might need to see end-of-file on its input before its output is returned to sslclient. This program's underlying SSL functionality is provided by OpenSSL[4]. OPTIONS
sslclient recognizes these options: -caf filename --ca_cert_file filename This identifies filename as a file of CA certificates in PEM format. This is the CAfile argument to the OpenSSL[4] SSL_CTX_load_verify_locations()[5] function. It is similar to mod_ssl's[6] SSLCACertificateFile[7] directive, except that it is used to verify the server's SSL certificate. -cad dirname --ca_cert_dir dirname This identifies dirname as a directory containing CA certificates in PEM format, one certificate per file. This is the CApath argument to the OpenSSL[4] SSL_CTX_load_verify_locations()[5] function. It is similar to mod_ssl's[6] SSLCACertificatePath[8] directive, except that it is used to verify the server's certificate. -ccf filename --cert_chain_file filename This causes the client certificate chain to be loaded from filename, a file containing certificates in PEM format. This is the file argument to the OpenSSL[4] SSL_CTX_use_certificate_chain_file()[9] function. It is similar to mod_ssl's[6] SSLCACertificateChainFile[10] directive, except that it is used for the client's chain. Tip If you want the client certificate to be sent you must also specify the -kf flag. -C cipherstring --ciphers cipherstring This sets the list of ciphers to be used to cipherstring. This is the str argument to the OpenSSL[4] SSL_CTX_set_cipher_list()[11] function. It is similar to mod_ssl's[6] SSLCipherSuite[12] directive. -dvp --default_verify_paths This flag tells sslclient to use default locations for finding CA certificates. It results in a call to the OpenSSL[4] SSL_CTX_set_default_verify_paths() function. -h --help Print a usage synopsis. -kf filename --key_file filename This sets sslclient's private key to the first private key found in filename. This is the file argument to the OpenSSL[4] SSL_CTX_usePrivateKey_file() function. The default private key file type is PEM. If the key has been encrypted, the program will prompt for the passphrase. -kft type --key_file_type type The private key file type is set to type, which must be either pem or asn1 (case insensitive). The default private key file type is PEM. -p portnum -sp portnum --server_port portnum Unless appended to the server argument, portnum is the port number to use, overriding the default port (443). -r filename --random filename Seed material for the PRNG is read from filename. This is the filename argument to the OpenSSL[4] RAND_load_file() function. -sm regex --server_match regex This argument, which may be repeated, specifies a constraint on the server's identity by matching an attribute value in the server's certificate against regex. These tests are made immediately after an SSL connection is established. Each regex is an IEEE Std 1003.2 ("POSIX.2") regular expression with extended expressions and case insensitivity (REG_EXTENDED | REG_ICASE). See below[13] for the matching algorithm. -vd depth --verify_depth depth This sets the maximum depth for certificate chain verification to depth. This is the depth argument to the OpenSSL[4] SSL_CTX_set_verify_depth() function. -vt type --verify_type type This sets the verification mode to type, which must be either none or peer (case insensitive). This is the mode argument to the OpenSSL[4] SSL_CTX_set_verify() function. -- This argument explicitly marks the end of the flags. The DACS -v (or --verbose) flag causes the program to show some of the server's SSL certificate, print feedback about regular expression matching, and so on. If sslclient is not doing what you expect, try using this flag. Server Identity Verification If the server presents a valid SSL (X.509) certificate, a set of checks is applied to it to help ensure that sslclient is communicating with the intended entity. Verification is successful and checking is terminated as soon as any test is successful. If no test succeeds, the program terminates immediately. Tip You can use a command like the following one to display an X.509 certificate to stdout in text form: % openssl x509 -noout -text < cert.crt Here, cert.crt is the certificate to display. The server certificate's subjectAltName extension fields have the format field-name:field-value. For each such field, tests are made in the following sequence: 1. the entire field is matched against each of the regular expressions given on the command line. 2. if the previous test failed and field-name is "DNS" (exact match), it is compared case insensitively to the server's name (as given on the command line). 3. if the previous test failed and if the field-name is "IP Address" (exact match), it is compared to the server's name (exact match), which is assumed to be an IP address (as given on the command line). If the above procedure is unsuccessful and the server certificate's commonName attribute value is available, it is matched against each of the regular expressions given on the command line. EXAMPLES
The following command line attempts to connect to port 443 at example.com and prints to stdout the server's response to a request for the home page: % perl -e 'printf "GET / HTTP/1.0 ";' | sslclient example.com:443 DIAGNOSTICS
When used with DACS logging configured, messages are directed to a log file, otherwise error messages and verbose output are written to stderr. The program exits 0 if everything was fine, 1 if an error occurred. NOTES
A wrapper mode of operation might be useful. It would also be useful to have a mode where it listens for an SSL connection for input (rather than its standard input) and then relays data over that connection to a specified server, possibly but not necessarily via SSL. This mode might run on a firewall host to forward an approved incoming SSL connection (presumably authenticated by a client certificate, and possibly by a DACS ruleset) to a service running on an interior host, for instance. SEE ALSO
http(1)[2], openssl(1)[4], s_client(1)[14], stunnel(1)[15], curl(1)[16], sslwrap(1)[17], and others, and regex(3)[18]. A variety of reference material on SSL/TLS is available. Perhaps best is Network Security with OpenSSL by John Viega, Matt Messier, and Pravir Chandra, O'Reilly & Associates, Inc., 2002. Also useful are SSL/TLS Strong Encryption: An Introduction[19], Netscape SSL 3.0 Specification[20], and RFC 2246[21]. AUTHOR
Distributed Systems Software (www.dss.ca[22]) COPYING
Copyright2003-2012 Distributed Systems Software. See the LICENSE[23] file that accompanies the distribution for licensing information. NOTES
1. dacsoptions http://dacs.dss.ca/man/dacs.1.html#dacsoptions 2. http(1) http://dacs.dss.ca/man/http.1.html 3. default SSL port for https (443) http://www.iana.org/assignments/port-numbers 4. OpenSSL http://www.openssl.org 5. SSL_CTX_load_verify_locations() http://www.openssl.org/docs/ssl/SSL_CTX_load_verify_locations.html 6. mod_ssl's http://httpd.apache.org/docs-2.2/mod/mod_ssl.html 7. SSLCACertificateFile http://httpd.apache.org/docs-2.2/mod/mod_ssl.html#sslcacertificatefile 8. SSLCACertificatePath http://httpd.apache.org/docs-2.2/mod/mod_ssl.html#sslcacertificatepath 9. SSL_CTX_use_certificate_chain_file() http://www.openssl.org/docs/ssl/SSL_CTX_use_certificate.html 10. SSLCACertificateChainFile http://httpd.apache.org/docs-2.2/mod/mod_ssl.html#sslcacertificatechainfile 11. SSL_CTX_set_cipher_list() http://www.openssl.org/docs/ssl/SSL_CTX_set_cipher_list.html 12. SSLCipherSuite http://httpd.apache.org/docs-2.2/mod/mod_ssl.html#sslciphersuite 13. below http://dacs.dss.ca/man/#verificaton 14. s_client(1) http://www.openssl.org/docs/apps/s_client.html 15. stunnel(1) http://www.stunnel.org 16. curl(1) http://directory.fsf.org/project/curl 17. sslwrap(1) http://www.rickk.com/sslwrap 18. regex(3) http://www.freebsd.org/cgi/man.cgi?query=regex&apropos=0&sektion=3&manpath=FreeBSD+9.0-RELEASE&format=html 19. SSL/TLS Strong Encryption: An Introduction http://httpd.apache.org/docs-2.2/ssl/ssl_intro.html 20. Netscape SSL 3.0 Specification http://web.archive.org/web/20070717014933rn_1/wp.netscape.com/eng/ssl3// 21. RFC 2246 http://www.rfc-editor.org/rfc/rfc2246.txt 22. www.dss.ca http://www.dss.ca 23. LICENSE http://dacs.dss.ca/man/../misc/LICENSE DACS 1.4.27b 10/22/2012 SSLCLIENT(1)
All times are GMT -4. The time now is 07:07 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy