03-09-2012
Redirecting requests from 8153 and blocking access to the same
Hey All,
Problem:
I have a application which runs on port 8153 (http) and on 8154 (https). For design reasons i can not block tcp connections to 8153.
How do i forward all requests from http 8153 to https 8154( this would be the ideal solution)
Or
redirect all requests that come to http localhost 8153 to https localhost
I have been able to achieve the following: redirect any request that is coming for http localhost 8153 to https localhost
I have the following in my ssl.cof
ProxyPass / http ://localhost:8153
ProxyPassReverse / http ://localhost:8153
In this setup, how do i stop direct access to http //localhost:8153 ( i can not use anything like iptables drop)
Any help is appreciated
9 More Discussions You Might Find Interesting
1. Email Antispam Techniques and Email Filtering
Now this is a bit tricky, but works great if you can decide which Top Level Domains or TLDs you want to receive mail We are getting so much spam from countries we never receive useful mail, I've been experimenting with blocking entire TLDs using sendmail access_db as an antispam technique.
... (0 Replies)
Discussion started by: Neo
0 Replies
2. Web Development
Hi everybody,
Is it possible to have a URL link i.e. <a href=""></a>, which sends out two requests to a site?
As an example, I want want to combine these two links. The first link loads files. The second link searches these files. But I want just one link, where went a user clicks on it,... (3 Replies)
Discussion started by: z1dane
3 Replies
3. IP Networking
say i have an apache server configured for ssl/non ssl virtual hosts and a proxy configured as follows (see squid.conf)
the ssl on each name based virtual host is configured on its own port (only 7 of the domains need this the rest are just media and other insignificant bits of data but domains... (1 Reply)
Discussion started by: hopper195
1 Replies
4. UNIX for Dummies Questions & Answers
Hi,
I need to install a program on my Centos 5.3 server that will block unauthorized ssh/ftp access attempts. The two features I require is that I should be able to configure the program to block the IP of the intruder after a a certain amount of access attempts and that it should display a... (3 Replies)
Discussion started by: mojoman
3 Replies
5. HP-UX
Hi All
I have a blade BL860c running on a C7000 chassis, in which is connected to a NetApp, so lately I am having I/O issues, and dmesg as well as syslog.log is reporting the following:
/dev/vg01/lvol2 file system file data error in dev/block 0/55892768
Page I/O error occurred while paging... (2 Replies)
Discussion started by: fretagi
2 Replies
6. Post Here to Contact Site Administrators and Moderators
For some reason Google Chrome sees unix.com as dangerous and has start to block it. I need to select advanced and continue on own risk.
Can you make an effort to remove unix.com form the list of dangerous site from Google.
IE has not this problem. (5 Replies)
Discussion started by: Jotne
5 Replies
7. Programming
among the below socket programming api's, please let me know which are blocking and non-blocking.
socket
accept
bind
listen
write
read
close (2 Replies)
Discussion started by: VSSajjan
2 Replies
8. SCO
I would like to log requests to rshd on OSR 5.0.7, hopefully it is possible.
Requests are coming from client Windows PCs, it all works most of the time, but few PCs are not able to do it.
I am not sure where to start - do I tweak syslog.conf? Any pointers would be appreciated. (4 Replies)
Discussion started by: migurus
4 Replies
9. Shell Programming and Scripting
Hi,
I'm trying to write a script to determine the time gap between HTTP PUT and HTTP DELETE requests in the HTTP Servers access log.
Normally client will do HTTP PUT to push content e.g. file_1.txt and 21 seconds later it will do HTTP DELETE, but sometimes the time varies causing some issues... (3 Replies)
Discussion started by: Juha
3 Replies
LEARN ABOUT MOJAVE
cpanplus::shell::default::plugins::remote
CPANPLUS::Shell::Default::Plugins::Remote(3pm) Perl Programmers Reference Guide CPANPLUS::Shell::Default::Plugins::Remote(3pm)
NAME
CPANPLUS::Shell::Default::Plugins::Remote - connect to a remote CPANPLUS
SYNOPSIS
CPAN Terminal> /connect localhost 1337 --user=foo --pass=bar
...
CPAN Terminal@localhost> /disconnect
DESCRIPTION
This is a "CPANPLUS::Shell::Default" plugin that allows you to connect to a machine running an instance of "CPANPLUS::Daemon", allowing
remote usage of the "CPANPLUS Shell".
A sample session, updating all modules on a remote machine, might look like this:
CPAN Terminal> /connect --user=my_user --pass=secret localhost 1337
Connection accepted
Successfully connected to 'localhost' on port '11337'
Note that no output will appear until a command has completed
-- this may take a while
CPAN Terminal@localhost> o; i *
[....]
CPAN Terminal@localhost> /disconnect
CPAN Terminal>
BUG REPORTS
Please report bugs or other issues to <bug-cpanplus@rt.cpan.org<gt>.
AUTHOR
This module by Jos Boumans <kane@cpan.org>.
COPYRIGHT
The CPAN++ interface (of which this module is a part of) is copyright (c) 2001 - 2007, Jos Boumans <kane@cpan.org>. All rights reserved.
This library is free software; you may redistribute and/or modify it under the same terms as Perl itself.
SEE ALSO
CPANPLUS::Shell::Default, CPANPLUS::Shell, cpanp
perl v5.18.2 2014-01-06 CPANPLUS::Shell::Default::Plugins::Remote(3pm)