Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 33993 invoked from network); 22 Apr 2007 03:38:17 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 22 Apr 2007 03:38:17 -0000 Received: (qmail 50676 invoked by uid 500); 22 Apr 2007 03:38:09 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 50639 invoked by uid 500); 22 Apr 2007 03:38:08 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 50628 invoked by uid 99); 22 Apr 2007 03:38:08 -0000 Received: from herse.apache.org (HELO herse.apache.org) (140.211.11.133) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 21 Apr 2007 20:38:08 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: pass (herse.apache.org: local policy) Received: from [63.215.161.134] (HELO mx02.detroitonline.com) (63.215.161.134) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 21 Apr 2007 20:38:00 -0700 Received: from d221-69-25.commercial.cgocable.net ([216.221.69.25] helo=[192.168.2.45]) by mx02.detroitonline.com with esmtpa (Exim 4.60) (envelope-from ) id 1HfSqt-0000h8-7p for users@httpd.apache.org; Sat, 21 Apr 2007 23:35:03 -0400 Message-ID: <462AE6B0.3080009@blazestudios.com> Date: Sat, 21 Apr 2007 23:38:08 -0500 From: "Tom Ray [Lists]" User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) MIME-Version: 1.0 To: users@httpd.apache.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org Subject: [users@httpd] SSL/Apache 2.0.x Question I've created a self-signed SSL for a site and while it works great, I'm getting that annoying "Not a Trusted Issuer" pop up. By looking over the ssl.conf it looked like I could do something in that might stop that error box from coming up. But I'm not overly sure what that is. I'm *guessing* that it's one or all of these settings: # Server Certificate Chain: # Point SSLCertificateChainFile at a file containing the # concatenation of PEM encoded CA certificates which form the # certificate chain for the server certificate. Alternatively # the referenced file can be the same as SSLCertificateFile # when the CA certificates are directly appended to the server # certificate for convinience. #SSLCertificateChainFile /usr/local/vps/blaze/apache/conf/ssl.crt/ca.crt # Certificate Authority (CA): # Set the CA certificate verification path where to find CA # certificates for client authentication or alternatively one # huge file containing all of them (file must be PEM encoded) # Note: Inside SSLCACertificatePath you need hash symlinks # to point to the certificate files. Use the provided # Makefile to update the hash symlinks after changes. #SSLCACertificatePath /usr/local/vps/blaze/apache/conf/ssl.crt #SSLCACertificateFile /usr/local/vps/blaze/apache/conf/ssl.crt/ca-bundle.crt # Certificate Revocation Lists (CRL): # Set the CA revocation path where to find CA CRLs for client # authentication or alternatively one huge file containing all # of them (file must be PEM encoded) # Note: Inside SSLCARevocationPath you need hash symlinks # to point to the certificate files. Use the provided # Makefile to update the hash symlinks after changes. #SSLCARevocationPath /usr/local/vps/blaze/apache/conf/ssl.crl #SSLCARevocationFile /usr/local/vps/blaze/apache/conf/ssl.crl/ca-bundle.crl # Client Authentication (Type): # Client certificate verification type and depth. Types are # none, optional, require and optional_no_ca. Depth is a # number which specifies how deeply to verify the certificate # issuer chain before deciding the certificate is not valid. #SSLVerifyClient require #SSLVerifyDepth 10 # Access Control: # With SSLRequire you can do per-directory access control based # on arbitrary complex boolean expressions containing server # variable checks and other lookup directives. The syntax is a # mixture between C and Perl. See the mod_ssl documentation # for more details. # #SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)/ \ # and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \ # and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \ # and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \ # and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 ) \ # or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/ # IS there a way for me to stop that error from coming up and have Apache tell the broswer(s) that the CA (me) is trusted? Or will the end user always have to install the certificate with each visit? TIA! --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org