Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 13912 invoked from network); 4 Nov 2010 16:25:49 -0000 Received: from unknown (HELO mail.apache.org) (140.211.11.3) by 140.211.11.9 with SMTP; 4 Nov 2010 16:25:49 -0000 Received: (qmail 47329 invoked by uid 500); 4 Nov 2010 16:26:18 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 47281 invoked by uid 500); 4 Nov 2010 16:26:18 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 47273 invoked by uid 99); 4 Nov 2010 16:26:18 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 04 Nov 2010 16:26:18 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: local policy) Received: from [80.101.152.15] (HELO router.joost.localnet) (80.101.152.15) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 04 Nov 2010 16:26:12 +0000 Received: from linux.joost.localnet (linux.joost.localnet [192.168.1.58]) by router.joost.localnet (Postfix) with ESMTP id 9F225560BAF for ; Thu, 4 Nov 2010 17:25:51 +0100 (CET) Message-ID: <4CD2DE8F.2030407@sanguis.xs4all.nl> Date: Thu, 04 Nov 2010 17:25:51 +0100 From: Joost de Heer Reply-To: joost@sanguis.xs4all.nl User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.9) Gecko/20100921 Fedora/3.1.4-1.fc13 Thunderbird/3.1.4 MIME-Version: 1.0 To: users@httpd.apache.org References: <4CD29148.6000907@gmail.com> In-Reply-To: <4CD29148.6000907@gmail.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org Subject: Re: [users@httpd] SSL redirect ? On 11/04/2010 11:56 AM, Brent Clark wrote: > Hiya > > I got an interesting request from a client and I was hoping to bounce this off > you guys. > > ------------------------------------------------------------------------------------------------------------------------------------------------------------ > > I need my linux server to accept incoming connections on port 8080 and > forward them to an HTTPS address and do all communications. > > So, if a developer connects to, and uses > > https://abc.com/v4/transaction?wsdl > > it should redirect, communicate, and return data from > > https://trans.api.hidden.com/v4/transaction?wsdl > > Basically, I need to mask the trans.api.hidden.com and make all communications > deal with abc.co.za. > ------------------------------------------------------------------------------------------------------------------------------------------------------------ > > > This is the same server. > > Personally I cant see this is possible, cause of the it been SSL. I would > assume this activity as no different as a MITM attack. > But googling, says I should look at mod_proxy. Is this possible? Yes, you need ProxyPass/ProxyPassReverse and SSLProxyEngine. Joost --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org