Return-Path:
Delivered-To: apmail-httpd-docs-archive@www.apache.org
Received: (qmail 5467 invoked from network); 25 Jan 2008 10:24:36 -0000
Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2)
by minotaur.apache.org with SMTP; 25 Jan 2008 10:24:36 -0000
Received: (qmail 78161 invoked by uid 500); 25 Jan 2008 10:24:26 -0000
Delivered-To: apmail-httpd-docs-archive@httpd.apache.org
Received: (qmail 78132 invoked by uid 500); 25 Jan 2008 10:24:26 -0000
Mailing-List: contact docs-help@httpd.apache.org; run by ezmlm
Precedence: bulk
list-help:
list-unsubscribe:
List-Post:
Reply-To: docs@httpd.apache.org
List-Id:
Delivered-To: mailing list docs@httpd.apache.org
Received: (qmail 78121 invoked by uid 99); 25 Jan 2008 10:24:26 -0000
Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136)
by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 25 Jan 2008 02:24:26 -0800
X-ASF-Spam-Status: No, hits=2.7 required=10.0
tests=SPF_NEUTRAL,WEIRD_PORT
X-Spam-Check-By: apache.org
Received-SPF: neutral (athena.apache.org: local policy)
Received: from [82.216.111.40] (HELO smtp4.tech.numericable.fr)
(82.216.111.40)
by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 25 Jan 2008 10:23:56 +0000
Received: from [82.216.51.110] (ip-110.net-82-216-51.brest.rev.numericable.fr
[82.216.51.110])
by smtp4.tech.numericable.fr (Postfix) with ESMTP id 1EB6512A80E
for ; Fri, 25 Jan 2008 11:23:57 +0100 (CET)
Message-ID: <4799B8FC.2090505@lorraine.iufm.fr>
Date: Fri, 25 Jan 2008 11:25:00 +0100
From: Lucien GENTIS
User-Agent: IceDove 1.5.0.14pre (X11/20071018)
MIME-Version: 1.0
To: docs@httpd.apache.org
Subject: [PATCH] patch for ssl_faq.xml from 2.x branch
Content-Type: multipart/mixed;
boundary="------------030307060700070805030401"
X-Virus-Checked: Checked by ClamAV on apache.org
--------------030307060700070805030401
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Hi to all,
I sent for a while a patch for ssl_faq.xml from trunk branch, so Noirin
commited it for trunk.
So I send today a patch for ssl_faq.xml from 2.x branch including
Noirin's modifications for trunk (because they apply to both branches)
Next time, I'll send my patches for both branches, I swear it ;-)
Lucien
--------------030307060700070805030401
Content-Type: text/x-diff;
name="ssl_faq.xml-2.x.patch"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
filename="ssl_faq.xml-2.x.patch"
Index: docs/manual/ssl/ssl_faq.xml
===================================================================
--- docs/manual/ssl/ssl_faq.xml (revision 615159)
+++ docs/manual/ssl/ssl_faq.xml (working copy)
@@ -48,7 +48,6 @@
@@ -151,7 +150,7 @@
How do I speak HTTPS manually for testing
purposes?
Why does the connection hang when I connect to my
-SSL-aware Apache server
+SSL-aware Apache server?
Why do I get ``Connection Refused'' errors, when
trying to access my newly installed Apache+mod_ssl server via HTTPS?
Why are the SSL_XXX
variables not
@@ -166,16 +165,17 @@
port 80, HTTPS to port 443), so there is no direct conflict between
them. You can either run two separate server instances bound to
these ports, or use Apache's elegant virtual hosting facility to
- create two virtual servers over one instance of Apache - one
- responding to requests on port 80 and speaking HTTP and the other
- responding to requests on port 443 speaking HTTPS.
+ create two virtual servers, both served by the same instance of Apache
+ - one responding over HTTP to requests on port 80, and the other
+ responding over HTTPS to requests on port 443.
Which port does HTTPS use?
You can run HTTPS on any port, but the standards specify port 443, which
is where any HTTPS compliant browser will look by default. You can force
- your browser to look on a different port by specifying it in the URL like
- this (for port 666): https://secure.server.dom:666/
+ your browser to look on a different port by specifying it in the URL. For
+ example, if your server is set up to serve pages over HTTPS on port 8080,
+ you can access them at https://example.com:8080/
How do I speak HTTPS manually for testing purposes?
@@ -187,7 +187,7 @@
for simple testing of Apache via HTTP, it's not so easy for
HTTPS because of the SSL protocol between TCP and HTTP. With the
help of OpenSSL's s_client
command, however, you can
- do a similar check for HTTPS:
+ do a similar check via HTTPS:
$ openssl s_client -connect localhost:443 -state -debug
GET / HTTP/1.0
@@ -198,7 +198,7 @@
perform GET and POST operations, can use a proxy, supports byte
ranges, etc. you should have a look at the nifty
cURL tool. Using this, you can
- check that Apache is responding correctly on ports 80 and 443 as
+ check that Apache is responding correctly to requests via HTTP and HTTPS as
follows:
$ curl http://localhost/
@@ -207,21 +207,19 @@
Why does the connection hang when I connect
to my SSL-aware Apache server?
-Because you connected with HTTP to the HTTPS port, i.e. you used an URL of
- the form ``http://
'' instead of ``https://
''.
- This also happens the other way round when you connect via HTTPS to a HTTP
- port, i.e. when you try to use ``https://
'' on a server that
- doesn't support SSL (on this port). Make sure you are connecting to a
- virtual server that supports SSL, which is probably the IP associated with
- your hostname, not localhost (127.0.0.1).
-
+This can happen when you try to connect to a HTTPS server (or virtual
+ server) via HTTP (eg, using http://example.com/
instead of
+ https://example.com
). It can also happen when trying to
+ connect via HTTPS to a HTTP server (eg, using
+ https://example.com/
on a server which doesn't support HTTPS,
+ or which supports it on a non-standard port). Make sure that you're
+ connecting to a (virtual) server that supports SSL.
+
Why do I get ``Connection Refused'' messages,
when trying to access my newly installed Apache+mod_ssl server via HTTPS?
-This can happen for various reasons. The most common mistakes
- include starting Apache with just apachectl start
(or
- httpd) instead of apachectl startssl
(or
- httpd -DSSL
). Your configuration may also be incorrect.
+
+ This error can be caused by an incorrect configuration.
Please make sure that your Listen directives match your
VirtualHost
@@ -250,7 +248,7 @@
This rewrite ruleset lets you use hyperlinks of the form
<a href="document.html:SSL">
, to switch to HTTPS
- in a relative link.
+ in a relative link. (Replace SSL with NOSSL to switch to HTTP.)
@@ -260,7 +258,7 @@
What are RSA Private Keys, CSRs and
Certificates?
Is there a difference on startup between
-the original Apache and an SSL-aware Apache?
+a non-SSL-aware Apache and an SSL-aware Apache?
How do I create a self-signed SSL
Certificate for testing purposes?
How do I create a real SSL Certificate?
@@ -306,7 +304,7 @@
Is there a difference on startup between
- the original Apache and an SSL-aware Apache?
+ a non-SSL-aware Apache and an SSL-aware Apache?
Yes. In general, starting Apache with
mod_ssl built-in is just like starting Apache
without it. However, if you have a passphrase on your SSL private
@@ -317,7 +315,8 @@
can be problematic - for example, when starting the server from the
system boot scripts. In this case, you can follow the steps
below to remove the passphrase from
- your private key.
+ your private key. Bear in mind that doing so brings additional security
+ risks - proceed with caution!
How do I create a self-signed SSL
@@ -512,7 +511,7 @@
How can I get rid of the pass-phrase dialog at Apache startup time?
The reason this dialog pops up at startup and every re-start
is that the RSA private key inside your server.key file is stored in
- encrypted format for security reasons. The pass-phrase is needed decrypt
+ encrypted format for security reasons. The pass-phrase is needed to decrypt
this file, so it can be read and parsed. Removing the pass-phrase
removes a layer of security from your server - proceed with caution!
@@ -579,7 +578,7 @@
bad certificate" error?
Errors such as OpenSSL: error:14094412: SSL
routines:SSL3_READ_BYTES:sslv3 alert bad certificate
in the SSL
- logfile, are usually caused a browser which is unable to handle the server
+ logfile, are usually caused by a browser which is unable to handle the server
certificate/private-key. For example, Netscape Navigator 3.x is
unable to handle RSA key lengths not equal to 1024 bits.
@@ -995,8 +994,8 @@
In case of core dumps please include a Backtrace
If your Apache+mod_ssl+OpenSSL dumps its core, please attach
a stack-frame ``backtrace'' (see below
- for information on how to get this). Without this information, the
- reason for your core dump cannot be found
+ for information on how to get this). This information is required
+ in order to find a reason for your core dump.
A detailed description of your problem
--------------030307060700070805030401
Content-Type: text/plain; charset=us-ascii
---------------------------------------------------------------------
To unsubscribe, e-mail: docs-unsubscribe@httpd.apache.org
For additional commands, e-mail: docs-help@httpd.apache.org
--------------030307060700070805030401--