[users@httpd] Websockets behind Apache and Nginx proxy, Connection and Upgrade headers not present

2015-08-23 Thread Nikolay Yakubitskiy
I have a problem. Apache listens on a white ip and proxies all requests /ssd on nginx that proxies requests /city-dashboard to another server with websockets. Apache default.conf: ProxyRequests On ProxyPreserveHost On ProxyPass "https://127.0.0.1:443"; ProxyPassReverse "https://127.0.0.

Re[2]: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Sterpu Victor
Ok. -- Original Message -- From: "Marat Khalili" To: users@httpd.apache.org Sent: 8/23/2015 8:16:06 PM Subject: Re: [users@httpd] SSL - How client certificates are verified? In this case, could you please post the results when you get the SSLOCSPEnable fixed? I'm particularly intereste

Re: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Marat Khalili
In this case, could you please post the results when you get the SSLOCSPEnable fixed? I'm particularly interested in performance. -- With Best Regards, Marat Khalili On 23/08/2015 19:57, Sterpu Victor wrote: There are 4 CAs, at least 1 uses OCSP(only 1 I called). I hope all of them use OCSP,

Re[2]: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Sterpu Victor
There are 4 CAs, at least 1 uses OCSP(only 1 I called). I hope all of them use OCSP, I don't know the legislation but it seems normal to be required by law. -- Original Message -- From: "Marat Khalili" To: users@httpd.apache.org Sent: 8/23/2015 7:51:14 PM Subject: Re: [users@httpd] SSL -

Re: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Marat Khalili
Oh, I see. In this case you will have to check the status of their certificates. Still, I suspect all of the tokens are issued by one CA. Probably it is better to ask this CA for their procedures: do they use OCSP or just publish CRLs. -- With Best Regards, Marat Khalili On 23/08/2015 19:41,

Re[2]: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Sterpu Victor
All clients already have PKCS11 tokens. It would be too complicated for them to get used with something else. -- Original Message -- From: "Marat Khalili" To: users@httpd.apache.org Sent: 8/23/2015 7:34:07 PM Subject: Re: [users@httpd] SSL - How client certificates are verified? I see.

Re: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Marat Khalili
I see. However, accepting clients certificates from the world recognized authorities is both more expensive (for clients) and more risky than running your own CA (recognized only by your server). If you personally know all your clients it is easier to issue them certificates directly, and revok

Re[2]: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Sterpu Victor
I want to make a page that will authenticate only with PKCS11 tokens. These tokens contain only certificates from a recognized authority. OCSP would be usefull if the token has been declared lost or stolen. But I don't want to make things too complicated. -- Original Message -- From: "Ma

Re[2]: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Sterpu Victor
I want to make a page that will authenticate only with PKCS11 tokens. These tokens contain only certificates from a recognized authority. OCSP would be usefull if the token has been declared lost or stolen. But I don't want to make things too complicated. -- Original Message -- From: "Mar

Re: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Marat Khalili
Hello, what is your scenario? If you issue (sign) client certificates yourself, Apache can correctly verify it against local CRL (certificate revocation list) file (server restart may be required after file update). There's information in the net concerning OCSP support for client authenticatio

Re: [users@httpd] Re: CGI environment variables different between 2.2 and 2.4?

2015-08-23 Thread Tom Browder
On Aug 22, 2015 8:57 PM, "Kurtis Rader" wrote: > On Sat, Aug 22, 2015 at 1:15 PM, Tom Browder wrote: >> Sorry for the confusion, Kurt, but I appreciate your look and >> analysis. Shall I file the bug, or would it be better coming from >> you. ... > You should open the issue since I have no speci

Re: Re[2]: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Mohanavelu Subramanian
yes you are right about client certificate verification with CA. i am not sure about OCSP verification. On Sun, Aug 23, 2015 at 1:21 PM, Sterpu Victor wrote: > I'm not sure I got this right, this is what I was thinking: > - client sends his certificate, with the public key included; the > certi

Re[2]: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Sterpu Victor
I'm not sure I got this right, this is what I was thinking: - client sends his certificate, with the public key included; the certificate contains a signature of the client certificate made with the private key of the CA; - apache server has the public key of the CA and can check the signature of

Re: [users@httpd] Apache Web Server rpm(2.2.x) for Linux OS to support TLSv1.2

2015-08-23 Thread Mohanavelu Subramanian
Hi Jeff, Thanks a lot and I try to compile as per the link. Regards, Mohan On Sun, Aug 23, 2015 at 11:33 AM, jeffmonte101 . wrote: > Hey Mohan, > > You may want to take a look into this link. > > > http://blog.ivanristic.com/2013/08/compiling-apache-with-static-openssl.html > > The above link

Re: [users@httpd] SSL - How client certificates are verified?

2015-08-23 Thread Mohanavelu Subramanian
Hi, With the option "SSLVerifyClient require" , server mandates the client to send its certificate for authentication. Then the server verifies this client certificate against the CA certificate file configured in apache. If the client certificate has been signed by a valid CA, then the authentica