Return-Path: Delivered-To: apmail-tomcat-users-archive@www.apache.org Received: (qmail 34679 invoked from network); 22 Jan 2010 15:19:32 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 22 Jan 2010 15:19:32 -0000 Received: (qmail 47104 invoked by uid 500); 22 Jan 2010 15:19:28 -0000 Delivered-To: apmail-tomcat-users-archive@tomcat.apache.org Received: (qmail 47020 invoked by uid 500); 22 Jan 2010 15:19:28 -0000 Mailing-List: contact users-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Users List" Delivered-To: mailing list users@tomcat.apache.org Received: (qmail 47009 invoked by uid 99); 22 Jan 2010 15:19:28 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 22 Jan 2010 15:19:28 +0000 X-ASF-Spam-Status: No, hits=2.7 required=10.0 tests=NORMAL_HTTP_TO_IP,SPF_HELO_PASS,SPF_NEUTRAL,WEIRD_PORT X-Spam-Check-By: apache.org Received-SPF: neutral (athena.apache.org: local policy) Received: from [80.67.31.30] (HELO smtprelay03.ispgateway.de) (80.67.31.30) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 22 Jan 2010 15:19:18 +0000 Received: from [217.111.50.100] (helo=tclx.cataneo.buero) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from ) id 1NYLHj-0002ff-Rn for users@tomcat.apache.org; Fri, 22 Jan 2010 16:18:55 +0100 Date: Fri, 22 Jan 2010 16:18:55 +0100 From: Tobias Crefeld To: users@tomcat.apache.org Subject: Re: mod_jk errors with tomcat 6.0.20 and Apache 2.0.52 Message-ID: <20100122161855.74108f2e@tclx.cataneo.buero> In-Reply-To: References: <20100122142449.043bc6d5@tclx.cataneo.buero> Organization: Cataneo GmbH X-Mailer: Claws Mail 3.0.2 (GTK+ 2.10.4; i386-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Df-Sender: tc@cataneo.de Am Fri, 22 Jan 2010 14:25:11 +0000 schrieb Matt Turner : > The SSL pass-through requirement explains why I was attempting to > pass through to :8443 directly - but it sounds like that's the wrong > approach. If it isn't possible to move the SSL-certificate and -keys to the Apache2 (and change the Tomcat to service ajp- or plain-http-requests) the only possibility to do a pass-through will be a NAT-machine / firewall with port-forwarding (e.g. port 443 -> 8443). There is another approach to passthrough https (=443) to 8443 by using xinetd: http://tp.its.yale.edu/pipermail/cas/2008-April/008083.html > Should I just use something like.. > > ProxyPass /cas https://10.13.0.218:8443/cas ? I doubt that this will work. A https-client (alias webbrowser) is transmitting SSL-traffic and ProxyPass is configuring a http-proxy which expects http - no matter what kind of traffic it use to connect to the "real" webserver. RU, Tobias. --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org For additional commands, e-mail: users-help@tomcat.apache.org