Sponsored Content
Full Discussion: Configure HTTPS
Operating Systems Linux Red Hat Configure HTTPS Post 302619259 by tannu on Thursday 5th of April 2012 07:19:22 AM
Old 04-05-2012
Configure HTTPS

HI

My system is already configured with HTTP setup and I am able to see all the contents using web browser (IE) that is http:// <ip address>

But when entered https://<ipaddress> it fails to return any contents.

Can anyone please tell how to configure for HTTPs, like which files to edit etc..

Code:
#uname -a
Linux 2.6.18-8.el5 #1 SMP Fri Jan 26 14:15:21 EST 2007 i686 i686 i386 GNU/Linux

Moderator's Comments:
Mod Comment Please use code tags. Video tutorial on how to use them. Thank you..

Last edited by Scrutinizer; 04-05-2012 at 08:21 AM.. Reason: code tags
 

7 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

out of inodes on https dev hd

Hi everybody i'm new in this forum (out of inodes on https dev hd) I'm getting this massages on a unix 5.0.6 If anyone could help me resolve this problem that will be so nice. Please help Thanks Jose (4 Replies)
Discussion started by: josramon
4 Replies

2. BSD

FreeBSD Postsnap via https

Hello, I was wondering if there are any https servers available for freebsd portsnap ? I would like to use portsnap behind my companies proxy servers. But alas they will not allow large compressed files through the proxy, which have alot of small files contained within the file. Obviously... (1 Reply)
Discussion started by: KaneCitizen
1 Replies

3. Shell Programming and Scripting

http and https

Hi friends, I have a local host http://ss3/cgi-bin/page/page_list.cgi running on apache webserver perfectly well. But suddenly, it stopped working and gave an error "Internet explorer Explorer cannot display the webpage". But when i added https, as https://ss3/cgi-bin/page/page_list.cgi the... (2 Replies)
Discussion started by: nmattam
2 Replies

4. AIX

wget https

Hello, can someone tell me where the certificate store on aix 6.1 is. If I want to use wget with a https site Iam getting an error that the issuer is untrusted. Thats right because its an self sign certificate. (3 Replies)
Discussion started by: ralphk
3 Replies

5. Cybersecurity

Snort HTTPS

Is it possible to rule out in alert all HTTPS traffic or rule out all the HTTPS trafic from the alerts on snort ? (3 Replies)
Discussion started by: drd0spt
3 Replies

6. Red Hat

SSL over https

Hi guys, I'm trying to generate a key using the genkey command in centos 6.4 and RHEL6.4, Every thing seems to go cool but I get this error message bad certificate request error -8016 and no key/cert is generated. I don't want use the many openssl(s) commands instead since genkey is a shourtcut... (3 Replies)
Discussion started by: leo_ultra_leo
3 Replies

7. Solaris

Need suggestion:- Failed HTTPS transfer to https://supportfiles.sun.com/curl

Hi Guys, I have recently started reciving below Error message Failed HTTPS transfer to https://supportfiles.sun.com/curl whenever I run /usr/local/bin/sudo /opt/SUNWexplo/bin/explorer -P -q -v from all Servers. Looks like the SSL certificate as Expired. Whenever I type... (4 Replies)
Discussion started by: manalisharmabe
4 Replies
APT-TRANSPORT-HTTP(1)							APT						     APT-TRANSPORT-HTTP(1)

NAME
apt-transport-https - APT transport for downloading via the HTTP Secure protocol (HTTPS) DESCRIPTION
This APT transport allows the use of repositories accessed via the HTTP Secure protocol (HTTPS), also referred to as HTTP over TLS. It is available by default since apt 1.5 and was available before that in the package apt-transport-https. Note that a transport is never called directly by a user but used by APT tools based on user configuration. HTTP is by itself an unencrypted transport protocol (compare apt-transport-http(1)), which, as indicated by the appended S, is wrapped in an encrypted layer known as Transport Layer Security (TLS) to provide end-to-end encryption. A sufficiently capable attacker can still observe the communication partners and deeper analyse of the encrypted communication might still reveal important details. An overview over available alternative transport methods is given in sources.list(5). OPTIONS
The HTTPS protocol is based on the HTTP protocol, so all options supported by apt-transport-http(1) are also available via Acquire::https and will default to the same values specified for Acquire::http. This manpage will only document the options unique to https. Server credentials By default all certificates trusted by the system (see ca-certificates package) are used for the verification of the server certificate. An alternative certificate authority (CA) can be configured with the Acquire::https::CAInfo option and its host-specific option Acquire::https::CAInfo::host. The CAInfo option specifies a file made up of CA certificates (in PEM format) concatenated together to create the chain which APT should use to verify the path from your self-signed root certificate. If the remote server provides the whole chain during the exchange, the file need only contain the root certificate. Otherwise, the whole chain is required. If you need to support multiple authorities, the only way is to concatenate everything. A custom certificate revocation list (CRL) can be configured with the options Acquire::https::CRLFile and Acquire::https::CRLFile::host. As with the previous option, a file in PEM format needs to be specified. Disabling security During server authentication, if certificate verification fails for some reason (expired, revoked, man in the middle, etc.), the connection fails. This is obviously what you want in all cases and what the default value (true) of the option Acquire::https::Verify-Peer and its host-specific variant provides. If you know exactly what you are doing, setting this option to "false" allows you to skip peer certificate verification and make the exchange succeed. Again, this option is for debugging or testing purposes only as it removes all security provided by the use of HTTPS. Similarly the option Acquire::https::Verify-Host and its host-specific variant can be used to deactivate a security feature: The certificate provided by the server includes the identity of the server which should match the DNS name used to access it. By default, as requested by RFC 2818, the name of the mirror is checked against the identity found in the certificate. This default behavior is safe and should not be changed, but if you know that the server you are using has a DNS name which does not match the identity in its certificate, you can set the option to "false", which will prevent the comparison from being performed. Client authentication Besides supporting password-based authentication (see apt_auth.conf(5)) HTTPS also supports authentication based on client certificates via Acquire::https::SSLCert and Acquire::https::SSLKey. These should be set respectively to the filename of the X.509 client certificate and the associated (unencrypted) private key, both in PEM format. In practice the use of the host-specific variants of both options is highly recommended. EXAMPLES
Acquire::https { Proxy::example.org "DIRECT"; Proxy "socks5h://apt:pass@localhost:9050"; Proxy-Auto-Detect "/usr/local/bin/apt-https-proxy-auto-detect"; No-Cache "true"; Max-Age "3600"; No-Store "true"; Timeout "10"; Dl-Limit "42"; Pipeline-Depth "0"; AllowRedirect "false"; User-Agent "My APT-HTTPS"; SendAccept "false"; CAInfo "/path/to/ca/certs.pem"; CRLFile "/path/to/all/crl.pem"; Verify-Peer "true"; Verify-Host::broken.example.org "false"; SSLCert::example.org "/path/to/client/cert.pem"; SSLKey::example.org "/path/to/client/key.pem" }; SEE ALSO
apt-transport-http(1) apt.conf(5) apt_auth.conf(5) sources.list(5) BUGS
APT bug page[1]. If you wish to report a bug in APT, please see /usr/share/doc/debian/bug-reporting.txt or the reportbug(1) command. AUTHOR
APT team NOTES
1. APT bug page http://bugs.debian.org/src:apt APT 1.6.3ubuntu0.1 20 August 2018 APT-TRANSPORT-HTTP(1)
All times are GMT -4. The time now is 11:32 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy