This appears at the very end of my httpd.conf in the /etc/apache directory
hopefullywhen you add these lines and uncomment and customize this conf.
you're question mite be answeredSubin.

# ----------------------------SSL----------------------------------
# This is an example configuration file for Apache-SSL.
# Copyright (C) 1995,6,7 Ben Laurie

# By popular demand, this file now illustrates the way to create two
websites,
# one secured (on port 8887), the other not (on port 8888).

# You may need one of thse
#User webuser
#User ben
#Group group

# SSL Servers MUST be standalone, currently.
#ServerType standalone

# The default port for SSL is 443...
#Port 8887
#Listen ServerPort
Listen 443

# My test document root
#DocumentRoot /u/ben/www/1/docs
#DocumentRoot /u/ben/apache/apache_1.3.0-ssl/htdocs

#<Directory /u/ben/apache/apache_1.3.0-ssl/htdocs/manual>
# This directive forbids access except when SSL is in use. Very handy for
# defending against configuration errors that expose stuff that should be
# protected
#SSLRequireSSL
#</Directory>

# Watch what's going on
#TransferLog /var/log/apache-ssl/transfer.log

# Note that all SSL options can apply to virtual hosts.

# Disable SSL. Useful in combination with virtual hosts. Note that SSLEnable
is
# now also supported.
SSLEnable

# Set the path for the global cache server executable.
# If this facility gives you trouble, you can disable it by setting
# CACHE_SESSIONS to FALSE in apache_ssl.c
SSLCacheServerPath /usr/lib/apache-ssl/gcache

# Set the global cache server port number, or path. If it is a path, a Unix
# domain socket is used. If a number, a TCP socket.
SSLCacheServerPort /var/run/gcache_port
#SSLCacheServerPort 1234

# Set the session cache timeout, in seconds (set to 15 for testing, use a
# higher value in real life)
SSLSessionCacheTimeout 15

# Set the CA certificate verification path (must be PEM encoded).
# (in addition to getenv("SSL_CERT_DIR"), I think).
#SSLCACertificatePath /u/ben/apache/apache_1.2.5-ssl/SSLconf/conf
SSLCACertificatePath /etc/apache-ssl

# Set the CA certificate verification file (must be PEM encoded).
# (in addition to getenv("SSL_CERT_FILE"), I think).
#SSLCACertificateFile /some/where/somefile
#SSLCACertificateFile /u/ben/apache/apache_1.2.5-ssl/SSLconf/conf/httpsd.pem

# Point SSLCertificateFile at a PEM encoded certificate.
# If the certificate is encrypted, then you will be prompted for a pass
phrase.
# Note that a kill -1 will prompt again.
# A test certificate can be generated with "make certificate".
SSLCertificateFile /etc/apache-ssl/apache.pem
#SSLCertificateFile /u/ben/apache/apache_1.2.6-ssl/SSLconf/conf/t1.pem


# If the key is not combined with the certificate, use this directive to
# point at the key file. If this starts with a '/' it specifies an absolute
# path, otherwise it is relative to the default certificate area. That is,
it
# means "<default>/private/<keyfile>".
#SSLCertificateKeyFile /some/place/with/your.key

# Set SSLVerifyClient to:
# 0 if no certicate is required
# 1 if the client may present a valid certificate
# 2 if the client must present a valid certificate
# 3 if the client may present a valid certificate but it is not required to
#   have a valid CA
SSLVerifyClient 0
# How deeply to verify before deciding they don't have a valid certificate
SSLVerifyDepth 10

# Translate the client X509 into a Basic authorisation. This means that the
# standard Auth/DBMAuth methods can be used for access control. The user
name
# is the "one line" version of the client's X509 certificate. Note that no
# password is obtained from the user. Every entry in the user file needs
this
# password: xxj31ZMTZzkVA. See the code for further explanation.
SSLFakeBasicAuth

# List the ciphers that the client is permitted to negotiate. See the source
# for a definitive list. For example:
#SSLRequiredCiphers RC4-MD5:RC4-SHA:IDEA-CBC-MD5:DES-CBC3-SHA

# These two can be used per-directory to require or ban ciphers. Note that
(at
# least in the current version) Apache-SSL will not attempt to renegotiate
if a
# cipher is banned (or not required).
#SSLRequireCipher
#SSLBanCipher

# A home for miscellaneous rubbish generated by SSL. Much of it is
duplicated
# in the error log file. Put this somewhere where it cannot be used for
symlink
# attacks on a real server (i.e. somewhere where only root can write).
#SSLLogFile /var/log/ssl.log

# Custom logging
CustomLog       /var/log/apache-ssl/ssl.log "%t %{version}c %{cipher}c
%{clientcert}c"

#<VirtualHost scuzzy:8888>
#SSLDisable
#SSLEnable
#</VirtualHost>

# If you want, you can disable SSL globally, and enable it in a virtual
host...
#<VirtualHost scuzzy:8887>
#SSLEnable
# and the rest of the SSL stuf...
#</VirtualHost>

# Experiment with authorization...
#<Directory /u/ben/www/1/docs>
#AuthType Basic
#AuthName Experimental
#AuthGroupFile /dev/null
#AuthUserFile /u/ben/www/1/users
#<Limit PUT GET>
#allow from all
#require valid-user
#</Limit>
#</Directory>

#ScriptAlias    /scripts        /u/ben/www/scripts

#<VirtualHost ServerName:443>
#SSLEnable
#</VirtualHost>
#Include /etc/phpmyadmin/apache.conf
----- Original Message ----- 
From: "Monique Y. Mudama" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, April 20, 2004 12:30 PM
Subject: Re: httpd.conf


> On 2004-04-20, Linux Nick penned:
> > This is a multi-part message in MIME format.
> >
> > ------=_NextPart_000_0048_01C426B2.FD4F8DE0 Content-Type: text/plain;
> > charset="US-ASCII" Content-Transfer-Encoding: 7bit
> >
> > Does anyone have a working httpd.conf file that they could send me,
> > directly or to the list? One that is hosting 2 sites in vhosts. Im
> > really looking for one that is hosting on secure and one that is
> > unsecure, but ill take just one with 2 working vhsots.  Im tired of
> > looking at "sample" configs they never seem to work, I want one in
> > production right now that is known to work.
> >
> > Also is it possible to host 1 secure site and 1 unsecure site on the
> > same address and when they put the https: instead of the http: the
> > server automaticly knows which one to serve? Or would I have to change
> > the name of one to be ssl.domain.com and the other www.domain.com?
>
> Rather than trying to do it all in one file, install both the apache and
> the apache-ssl packages.  You will then have separate configuration
> files for your secure and insecure servers, one in /etc/apache, one in
> /etc/apache-ssl.
>
> HTTPS uses a different port by default than does HTTP, so there should
> be no naming or IP issue.
>
> -- 
> monique
>
>
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
>
>



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to