SSL in Apache einbinden

Apache, Lighttpd, nginx, Cherokee
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

SSL in Apache einbinden

Post by hademak »

So ich hab folgendes Problem:

Ich hab jetzt mein Zertifikat selbst signiert, d.h. ich müsste jetzt alles haben was ich brauche. Aber wie verklickere ich jetzt Apache dass wenn ich https://meineseite.de aufrufe die Seite http://meineseite.de/unterordner rauskomme und das ganze halt noch verschlüsselt wennsch https:// mache??

Thx im Voraus
Hademak
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

will/kann mir keiner helfen? :(
dragsta
Posts: 46
Joined: 2003-02-13 22:48
Location: Aachen
 

Re: SSL in Apache einbinden

Post by dragsta »

hi,

du benutzt ja bestimmt virtual hosts.

Dann musst du einfach einen neuen VirtualHost-Container machen, mit den gleichen Angaben wie der, der schon existiert, ungefähr so:

<VirtualHost 123.123.123.123:443>

# hier das so wie beim http eintrag, evtl. andere log-datei

SSLCertificateFile /pfad/zum/zertifikat/certificate.cert
SSLCertificateKeyFile /pfad/zum/zertifikat/certificate.key
SSLEngine on
</VirtualHost>

Apache restart, und es sollte gehen.

mfg
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

Ich hab da jeztt was gefunden, das ganze sieht jetzt so aus:

<VirtualHost x.x.x.x:443>

# General setup for the virtual host
DocumentRoot "/opt/secure/html"
ServerName ssl.meineseite.de
ServerAdmin mail@meineseite.de
ErrorLog /var/log/httpd/error_log
TransferLog /var/log/httpd/access_log

# SSL Engine Switch:
# Enable/Disable SSL for this virtual host.
SSLEngine on

# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL

# Server Certificate:
# Point SSLCertificateFile at a PEM encoded certificate. If
# the certificate is encrypted, then you will be prompted for a
# pass phrase. Note that a kill -HUP will prompt again. A test
# certificate can be generated with `make certificate' under
# built time. Keep in mind that if you've both a RSA and a DSA
# certificate you can configure both in parallel (to also allow
# the use of DSA ciphers, etc.)
SSLCertificateFile /etc/httpd/ssl/cacert.pem
SSLCertificateFile /etc/httpd/ssl/cakey.pem

# Server Private Key:
# If the key is not combined with the certificate, use this
# directive to point at the key file. Keep in mind that if
# you've both a RSA and a DSA private key you can configure
# both in parallel (to also allow the use of DSA ciphers, etc.)
SSLCertificateKeyFile /etc/httpd/ssl.key/server.key
#SSLCertificateKeyFile /etc/httpd/ssl.key/server-dsa.key

# Server Certificate Chain:
# Point SSLCertificateChainFile at a file containing the
# concatenation of PEM encoded CA certificates which form the
# certificate chain for the server certificate. Alternatively
# the referenced file can be the same as SSLCertificateFile
# when the CA certificates are directly appended to the server
# certificate for convinience.
#SSLCertificateChainFile /etc/httpd/ssl.crt/ca.crt

# Certificate Authority (CA):
# Set the CA certificate verification path where to find CA
# certificates for client authentication or alternatively one
# huge file containing all of them (file must be PEM encoded)
# Note: Inside SSLCACertificatePath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
#SSLCACertificatePath /etc/httpd/ssl.crt
#SSLCACertificateFile /etc/httpd/ssl.crt/ca-bundle.crt

# Certificate Revocation Lists (CRL):
# Set the CA revocation path where to find CA CRLs for client
# authentication or alternatively one huge file containing all
# of them (file must be PEM encoded)
# Note: Inside SSLCARevocationPath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
#SSLCARevocationPath /etc/httpd/ssl.crl
#SSLCARevocationFile /etc/httpd/ssl.crl/ca-bundle.crl

# Client Authentication (Type):
# Client certificate verification type and depth. Types are
# none, optional, require and optional_no_ca. Depth is a
# number which specifies how deeply to verify the certificate
# issuer chain before deciding the certificate is not valid.
#SSLVerifyClient require
#SSLVerifyDepth 10

# Access Control:
# With SSLRequire you can do per-directory access control based
# on arbitrary complex boolean expressions containing server
# variable checks and other lookup directives. The syntax is a
# mixture between C and Perl. See the mod_ssl documentation
# for more details.
#<Location />
#SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)/
# and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd."
# and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"}
# and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5
# and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 )
# or %{REMOTE_ADDR} =~ m/^192.76.162.[0-9]+$/
#</Location>

# SSL Engine Options:
# Set various options for the SSL engine.
# o FakeBasicAuth:
# Translate the client X.509 into a Basic Authorisation. This means that
# the standard Auth/DBMAuth methods can be used for access control. The
# user name is the `one line' version of the client's X.509 certificate.
# Note that no password is obtained from the user. Every entry in the user
# file needs this password: `xxj31ZMTZzkVA'.
# o ExportCertData:
# This exports two additional environment variables: SSL_CLIENT_CERT and
# SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
# server (always existing) and the client (only existing when client
# authentication is used). This can be used to import the certificates
# into CGI scripts.
# o StdEnvVars:
# This exports the standard SSL/TLS related `SSL_*' environment variables.
# Per default this exportation is switched off for performance reasons,
# because the extraction step is an expensive operation and is usually
# useless for serving static content. So one usually enables the
# exportation for CGI and SSI requests only.
# o CompatEnvVars:
# This exports obsolete environment variables for backward compatibility
# to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold 2.x. Use this
# to provide compatibility to existing CGI scripts.
# o StrictRequire:
# This denies access when "SSLRequireSSL" or "SSLRequire" applied even
# under a "Satisfy any" situation, i.e. when it applies access is denied
# and no other module can change it.
# o OptRenegotiate:
# This enables optimized SSL connection renegotiation handling when SSL
# directives are used in per-directory context.
#SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVars +StrictRequire
<Files ~ ".(cgi|shtml|phtml|php3?)$">
SSLOptions +StdEnvVars
</Files>
<Directory "/usr/local/httpd/cgi-bin">
SSLOptions +StdEnvVars
</Directory>

# SSL Protocol Adjustments:
# The safe and default but still SSL/TLS standard compliant shutdown
# approach is that mod_ssl sends the close notify alert but doesn't wait for
# the close notify alert from client. When you need a different shutdown
# approach you can use one of the following variables:
# o ssl-unclean-shutdown:
# This forces an unclean shutdown when the connection is closed, i.e. no
# SSL close notify alert is send or allowed to received. This violates
# the SSL/TLS standard but is needed for some brain-dead browsers. Use
# this when you receive I/O errors because of the standard approach where
# mod_ssl sends the close notify alert.
# o ssl-accurate-shutdown:
# This forces an accurate shutdown when the connection is closed, i.e. a
# SSL close notify alert is send and mod_ssl waits for the close notify
# alert of the client. This is 100% SSL/TLS standard compliant, but in
# practice often causes hanging connections with brain-dead browsers. Use
# this only for browsers where you know that their SSL implementation
# works correctly.
# Notice: Most problems of broken clients are also related to the HTTP
# keep-alive facility, so you usually additionally want to disable
# keep-alive for those clients, too. Use variable "nokeepalive" for this.
# Similarly, one has to force some clients to use HTTP/1.0 to workaround
# their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
# "force-response-1.0" for this.
SetEnvIf User-Agent ".*MSIE.*"
nokeepalive ssl-unclean-shutdown
downgrade-1.0 force-response-1.0

# Per-Server Logging:
# The home of a custom SSL log file. Use this when you want a
# compact non-error SSL logfile on a virtual host basis.
CustomLog /var/log/httpd/ssl_request_log
"%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x "%r" %b"

</VirtualHost>

funktionert aber trotzdem nicht... im nameserver muss ich kein eintrag machen oder?!? *grad so durch kopf gegagen ist*
dragsta
Posts: 46
Joined: 2003-02-13 22:48
Location: Aachen
 

Re: SSL in Apache einbinden

Post by dragsta »

mit der aussage "dat geht nich" kann man nicht soviel anfangen.

was geht nicht? apache starten? nur der neue virtualhost? alle? wie sieht die fehlermedlung aus?

zum ns:

ist denn ssl.deinhost.tld auch eingetragen? muss natürlich sein. oder ein *, das würde auch gehen. am einfachsten testest du das, indem du mal einen ping auf ssl.deinhost.tld sendest, wird die domain aufgelöst, liegt es nicht am ns.

mfg
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

dragsta wrote:mit der aussage "dat geht nich" kann man nicht soviel anfangen.

was geht nicht? apache starten? nur der neue virtualhost? alle? wie sieht die fehlermedlung aus?

zum ns:

ist denn ssl.deinhost.tld auch eingetragen? muss natürlich sein. oder ein *, das würde auch gehen. am einfachsten testest du das, indem du mal einen ping auf ssl.deinhost.tld sendest, wird die domain aufgelöst, liegt es nicht am ns.

mfg
oh ich hab das im ns noch net eingestellt, ziemlich blöd von mir...
ehm ja ich schätze mal wenn das eingerichtet ist wirds gehn, mir gings aber im letzten beitrag vorallem darum ob die config so stimmt...
thx
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

So ssl.meinedomain.tld ist drinne - wenn ich sie aufrufe lande ich ganz normal auf der website.
wenn ich https://ssl.meinedomain.tld aufrufe kommt "Die Seite kann nicht angezeigt werden." ich hab im NS eingerichtet:

ssl.meinedomain.tld. A meine-normale-ip-adresse.
dragsta
Posts: 46
Joined: 2003-02-13 22:48
Location: Aachen
 

Re: SSL in Apache einbinden

Post by dragsta »

hast du mal einen ping auf ssl.deinedomain.tld gemacht?
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

joa klappt mit 100%
das problem liegt nur noch an den https:

http://ssl.kinderhilfswerk-oberursel.de << geht aber natürlich unversclüsselt

https://ssl.kinderhilfswerk-oberursel.de << geht net
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

ehm hiermal der ausschnitt aus der httpd.conf:

<VirtualHost 62.146.x.x:443>

# General setup for the virtual host
DocumentRoot "/opt/web8/html"
ServerName ssl.kinderhilfswerk-oberursel.de
ServerAdmin info@kinderhilfswerk-oberursel.de
ErrorLog /var/log/httpd/error_log
TransferLog /var/log/httpd/access_log

# SSL Engine Switch:
# Enable/Disable SSL for this virtual host.
SSLEngine on

# SSL Cipher Suite:
# List the ciphers that the client is permitted to negotiate.
# See the mod_ssl documentation for a complete list.
SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL

# Server Certificate:
# Point SSLCertificateFile at a PEM encoded certificate. If
# the certificate is encrypted, then you will be prompted for a
# pass phrase. Note that a kill -HUP will prompt again. A test
# certificate can be generated with `make certificate' under
# built time. Keep in mind that if you've both a RSA and a DSA
# certificate you can configure both in parallel (to also allow
# the use of DSA ciphers, etc.)
SSLCertificateFile /etc/httpd/ssl/cacert.pem
SSLCertificateFile /etc/httpd/ssl/cakey.pem

# Server Private Key:
# If the key is not combined with the certificate, use this
# directive to point at the key file. Keep in mind that if
# you've both a RSA and a DSA private key you can configure
# both in parallel (to also allow the use of DSA ciphers, etc.)
SSLCertificateKeyFile /etc/httpd/ssl.key/server.key
SSLCertificateKeyFile /etc/httpd/ssl.key/server-dsa.key

# Server Certificate Chain:
# Point SSLCertificateChainFile at a file containing the
# concatenation of PEM encoded CA certificates which form the
# certificate chain for the server certificate. Alternatively
# the referenced file can be the same as SSLCertificateFile
# when the CA certificates are directly appended to the server
# certificate for convinience.
SSLCertificateChainFile /etc/httpd/ssl.crt/ca.crt

# Certificate Authority (CA):
# Set the CA certificate verification path where to find CA
# certificates for client authentication or alternatively one
# huge file containing all of them (file must be PEM encoded)
# Note: Inside SSLCACertificatePath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
SSLCACertificatePath /etc/httpd/ssl.crt
SSLCACertificateFile /etc/httpd/ssl.crt/ca-bundle.crt

# Certificate Revocation Lists (CRL):
# Set the CA revocation path where to find CA CRLs for client
# authentication or alternatively one huge file containing all
# of them (file must be PEM encoded)
# Note: Inside SSLCARevocationPath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
SSLCARevocationPath /etc/httpd/ssl.crl
SSLCARevocationFile /etc/httpd/ssl.crl/ca-bundle.crl

# Client Authentication (Type):
# Client certificate verification type and depth. Types are
# none, optional, require and optional_no_ca. Depth is a
# number which specifies how deeply to verify the certificate
# issuer chain before deciding the certificate is not valid.
SSLVerifyClient require
SSLVerifyDepth 10

# Access Control:
# With SSLRequire you can do per-directory access control based
# on arbitrary complex boolean expressions containing server
# variable checks and other lookup directives. The syntax is a
# mixture between C and Perl. See the mod_ssl documentation
# for more details.
<Location />
SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)/
and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd."
and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"}
and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5
and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 )
or %{REMOTE_ADDR} =~ m/^192.76.162.[0-9]+$/
</Location>

# SSL Engine Options:
# Set various options for the SSL engine.
# o FakeBasicAuth:
# Translate the client X.509 into a Basic Authorisation. This means that
# the standard Auth/DBMAuth methods can be used for access control. The
# user name is the `one line' version of the client's X.509 certificate.
# Note that no password is obtained from the user. Every entry in the user
# file needs this password: `xxj31ZMTZzkVA'.
# o ExportCertData:
# This exports two additional environment variables: SSL_CLIENT_CERT and
# SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
# server (always existing) and the client (only existing when client
# authentication is used). This can be used to import the certificates
# into CGI scripts.
# o StdEnvVars:
# This exports the standard SSL/TLS related `SSL_*' environment variables.
# Per default this exportation is switched off for performance reasons,
# because the extraction step is an expensive operation and is usually
# useless for serving static content. So one usually enables the
# exportation for CGI and SSI requests only.
# o CompatEnvVars:
# This exports obsolete environment variables for backward compatibility
# to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold 2.x. Use this
# to provide compatibility to existing CGI scripts.
# o StrictRequire:
# This denies access when "SSLRequireSSL" or "SSLRequire" applied even
# under a "Satisfy any" situation, i.e. when it applies access is denied
# and no other module can change it.
# o OptRenegotiate:
# This enables optimized SSL connection renegotiation handling when SSL
# directives are used in per-directory context.
SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVars +StrictRequire
<Files ~ ".(cgi|shtml|phtml|php3?)$">
SSLOptions +StdEnvVars
</Files>
<Directory "/usr/local/httpd/cgi-bin">
SSLOptions +StdEnvVars
</Directory>

# SSL Protocol Adjustments:
# The safe and default but still SSL/TLS standard compliant shutdown
# approach is that mod_ssl sends the close notify alert but doesn't wait for
# the close notify alert from client. When you need a different shutdown
# approach you can use one of the following variables:
# o ssl-unclean-shutdown:
# This forces an unclean shutdown when the connection is closed, i.e. no
# SSL close notify alert is send or allowed to received. This violates
# the SSL/TLS standard but is needed for some brain-dead browsers. Use
# this when you receive I/O errors because of the standard approach where
# mod_ssl sends the close notify alert.
# o ssl-accurate-shutdown:
# This forces an accurate shutdown when the connection is closed, i.e. a
# SSL close notify alert is send and mod_ssl waits for the close notify
# alert of the client. This is 100% SSL/TLS standard compliant, but in
# practice often causes hanging connections with brain-dead browsers. Use
# this only for browsers where you know that their SSL implementation
# works correctly.
# Notice: Most problems of broken clients are also related to the HTTP
# keep-alive facility, so you usually additionally want to disable
# keep-alive for those clients, too. Use variable "nokeepalive" for this.
# Similarly, one has to force some clients to use HTTP/1.0 to workaround
# their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
# "force-response-1.0" for this.
SetEnvIf User-Agent ".*MSIE.*"
nokeepalive ssl-unclean-shutdown
downgrade-1.0 force-response-1.0

# Per-Server Logging:
# The home of a custom SSL log file. Use this when you want a
# compact non-error SSL logfile on a virtual host basis.
CustomLog /var/log/httpd/ssl_request_log
"%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x "%r" %b"

</VirtualHost>
rootmaster
Posts: 483
Joined: 2002-04-28 13:30
Location: Hannover
 

Re: SSL in Apache einbinden

Post by rootmaster »

was sagt denn der apache, wenn du ihn neu startest ??

"back to the roots"
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

gar nichts, ganz normal... kanns sein das ich was im nameserver vergessen habe? also im ns siehts so aus:

Resource Records für kinderhilfswerk-oberursel.de.

Name Typ Inhalt Bearbeiten Löschen

kinderhilfswerk-oberursel.de. NS ns1.speeddns.de. Bearbeiten Löschen

kinderhilfswerk-oberursel.de. NS ns2.speeddns.de. Bearbeiten Löschen

kinderhilfswerk-oberursel.de. MX Präferenz=10
kinderhilfswerk-oberursel.de. Bearbeiten Löschen

http://www.kinderhilfswerk-oberursel.de. CNAME kinderhilfswerk-oberursel.de. Bearbeiten Löschen

ftp.kinderhilfswerk-oberursel.de. CNAME kinderhilfswerk-oberursel.de. Bearbeiten Löschen

mail.kinderhilfswerk-oberursel.de. CNAME kinderhilfswerk-oberursel.de. Bearbeiten Löschen

kinderhilfswerk-oberursel.de. A 62.146.223.208 Bearbeiten Löschen

localhost.kinderhilfswerk-oberursel.de. A 127.0.0.1 Bearbeiten Löschen

ssl.kinderhilfswerk-oberursel.de. A 62.146.223.208 Bearbeiten Löschen
duergner
Posts: 923
Joined: 2003-08-20 11:30
Location: Pittsburgh, PA, USA
 

Re: SSL in Apache einbinden

Post by duergner »

Lauscht dein Apache denn überhaupt auf Port 443? Was sagt denn ein nmap auf die IP?

Wenn er auf dem Port lauscht, wärs sinnvoll, mal die Start-Logs durchzusehen ob da was drinnen is.
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

duergner wrote:Lauscht dein Apache denn überhaupt auf Port 443? Was sagt denn ein nmap auf die IP?

Wenn er auf dem Port lauscht, wärs sinnvoll, mal die Start-Logs durchzusehen ob da was drinnen is.
ehm ja, keine ahnung :oops: was ist denn ein nmap und womit und wie mach ich das? :oops:
duergner
Posts: 923
Joined: 2003-08-20 11:30
Location: Pittsburgh, PA, USA
 

Re: SSL in Apache einbinden

Post by duergner »

Hademak wrote:ehm ja, keine ahnung :oops: was ist denn ein nmap und womit und wie mach ich das? :oops:
nmap ist ein Portscanner unter Linux. Du betreibst einen Server der auch noch SSL können soll und weißt nicht mal was ein Portscanner ist?
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

ich weiß was ein portscanner is aber nmap kannte ich noch net...

Code: Select all

login:~ # nmap 62.146.223.208

Starting nmap V. 2.54BETA30 ( www.insecure.org/nmap/ )
Interesting ports on login.icefresh-online.de (62.146.223.208):
(The 1541 ports scanned but not shown below are in state: closed)
Port       State       Service
21/tcp     open        ftp
22/tcp     open        ssh
25/tcp     open        smtp
80/tcp     open        http
110/tcp    open        pop-3
111/tcp    open        sunrpc
3306/tcp   open        mysql
10000/tcp  open        snet-sensor-mgmt


Nmap run completed -- 1 IP address (1 host up) scanned in 1 second
hm... kann ja wohl nicht gehenwenn der port nicht offen ist - wie öffne ich den?
duergner
Posts: 923
Joined: 2003-08-20 11:30
Location: Pittsburgh, PA, USA
 

Re: SSL in Apache einbinden

Post by duergner »

Hademak wrote:hm... kann ja wohl nicht gehenwenn der port nicht offen ist - wie öffne ich den?
Indem du den Apachen auch an diesem Port lauschen lässt. Poste doch unter Umständen mal den Anfang deiner httpd.conf, also den allgemeinen Teil. (Aber bitte ohne Kommentare sonst is das immer so viel zu lesen)
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

wie wärs damit?

Post by hademak »

#
# Port: The port to which the standalone server listens. For
# ports < 1023, you will need httpd to be run as root initially.
#
Port 80

##
## SSL Support
##
## When we also provide SSL we have to listen to the
## standard HTTP port (see above) and to the HTTPS port
##
<IfDefine SSL>
Listen 80
Listen 443
</IfDefine>

ist das der teil oder brauchste noch mehr?
duergner
Posts: 923
Joined: 2003-08-20 11:30
Location: Pittsburgh, PA, USA
 

Re: wie wärs damit?

Post by duergner »

Hademak wrote:#
# Port: The port to which the standalone server listens. For
# ports < 1023, you will need httpd to be run as root initially.
#
Port 80

##
## SSL Support
##
## When we also provide SSL we have to listen to the
## standard HTTP port (see above) and to the HTTPS port
##
<IfDefine SSL>
Listen 80
Listen 443
</IfDefine>

ist das der teil oder brauchste noch mehr?
Wird mod_ssl denn geladen?
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

# Apache no longer needs to be started with '-D <modules>' switches (with
# the exception of mod_ssl, which has a lot of conditional statements).

# Example:
# LoadModule foo_module libexec/mod_foo.so
LoadModule mmap_static_module /usr/lib/apache/mod_mmap_static.so
LoadModule vhost_alias_module /usr/lib/apache/mod_vhost_alias.so
LoadModule env_module /usr/lib/apache/mod_env.so
LoadModule define_module /usr/lib/apache/mod_define.so
LoadModule config_log_module /usr/lib/apache/mod_log_config.so
LoadModule agent_log_module /usr/lib/apache/mod_log_agent.so
LoadModule referer_log_module /usr/lib/apache/mod_log_referer.so
LoadModule mime_magic_module /usr/lib/apache/mod_mime_magic.so
LoadModule mime_module /usr/lib/apache/mod_mime.so
LoadModule negotiation_module /usr/lib/apache/mod_negotiation.so
LoadModule status_module /usr/lib/apache/mod_status.so
LoadModule info_module /usr/lib/apache/mod_info.so
LoadModule includes_module /usr/lib/apache/mod_include.so
LoadModule autoindex_module /usr/lib/apache/mod_autoindex.so
LoadModule dir_module /usr/lib/apache/mod_dir.so
LoadModule cgi_module /usr/lib/apache/mod_cgi.so
LoadModule asis_module /usr/lib/apache/mod_asis.so
LoadModule imap_module /usr/lib/apache/mod_imap.so
LoadModule action_module /usr/lib/apache/mod_actions.so
LoadModule speling_module /usr/lib/apache/mod_speling.so
# mod_userdir will be included below by SuSEconfig if HTTPD_SEC_PUBLIC_HTML=yes
LoadModule alias_module /usr/lib/apache/mod_alias.so
LoadModule rewrite_module /usr/lib/apache/mod_rewrite.so
LoadModule access_module /usr/lib/apache/mod_access.so
LoadModule auth_module /usr/lib/apache/mod_auth.so
LoadModule anon_auth_module /usr/lib/apache/mod_auth_anon.so
LoadModule dbm_auth_module /usr/lib/apache/mod_auth_dbm.so
LoadModule db_auth_module /usr/lib/apache/mod_auth_db.so
LoadModule digest_module /usr/lib/apache/mod_digest.so
LoadModule proxy_module /usr/lib/apache/libproxy.so
LoadModule cern_meta_module /usr/lib/apache/mod_cern_meta.so
LoadModule expires_module /usr/lib/apache/mod_expires.so
LoadModule headers_module /usr/lib/apache/mod_headers.so
LoadModule usertrack_module /usr/lib/apache/mod_usertrack.so
LoadModule unique_id_module /usr/lib/apache/mod_unique_id.so
LoadModule setenvif_module /usr/lib/apache/mod_setenvif.so
<IfDefine DUMMYSSL>
LoadModule ssl_module /usr/lib/apache/libssl.so
</IfDefine>

Include /etc/httpd/suse_loadmodule.conf


# Reconstruction of the complete module list from all available modules
# (static and shared ones) to achieve correct module execution order.
# [WHENEVER YOU CHANGE THE LOADMODULE SECTION ABOVE UPDATE THIS, TOO]
ClearModuleList
AddModule mod_mmap_static.c
AddModule mod_vhost_alias.c
AddModule mod_env.c
AddModule mod_define.c
AddModule mod_log_config.c
AddModule mod_log_agent.c
AddModule mod_log_referer.c
AddModule mod_mime_magic.c
AddModule mod_mime.c
AddModule mod_negotiation.c
AddModule mod_status.c
AddModule mod_info.c
AddModule mod_include.c
AddModule mod_autoindex.c
AddModule mod_dir.c
AddModule mod_cgi.c
AddModule mod_asis.c
AddModule mod_imap.c
AddModule mod_actions.c
AddModule mod_speling.c
# mod_userdir will be included below by SuSEconfig if HTTPD_SEC_PUBLIC_HTML=yes
AddModule mod_alias.c
AddModule mod_rewrite.c
AddModule mod_access.c
AddModule mod_auth.c
AddModule mod_auth_anon.c
AddModule mod_auth_dbm.c
AddModule mod_auth_db.c
AddModule mod_digest.c
AddModule mod_proxy.c
AddModule mod_cern_meta.c
AddModule mod_expires.c
AddModule mod_headers.c
AddModule mod_usertrack.c
AddModule mod_unique_id.c
AddModule mod_so.c
AddModule mod_setenvif.c
<IfDefine DUMMYSSL>
AddModule mod_ssl.c
</IfDefine>

sieht so aus, wobei vlleicht sollte ich mal das ifdefine wegmachen..
duergner
Posts: 923
Joined: 2003-08-20 11:30
Location: Pittsburgh, PA, USA
 

Re: SSL in Apache einbinden

Post by duergner »

[quote="Hademak]sieht so aus, wobei vlleicht sollte ich mal das ifdefine wegmachen..[/quote]

Hmm kannst mal versuchen. Ich muss gestehen ich hab keine Ahnung wo dieses DUMMYSSL herkommt/herkommen soll.
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

Code: Select all

login:/etc/httpd # rcapache restart
Shutting down httpd                                                  done
Starting httpd [ PERL PHP4 Python ]

Syntax error on line 312 of /etc/httpd/httpd.conf:
Cannot add module via name 'mod_ssl.c': not in list of loaded modulesfailed
:roll:
duergner
Posts: 923
Joined: 2003-08-20 11:30
Location: Pittsburgh, PA, USA
 

Re: SSL in Apache einbinden

Post by duergner »

Hademak wrote:

Code: Select all

login:/etc/httpd # rcapache restart
Shutting down httpd                                                  done
Starting httpd [ PERL PHP4 Python ]

Syntax error on line 312 of /etc/httpd/httpd.conf:
Cannot add module via name 'mod_ssl.c': not in list of loaded modulesfailed
:roll:
Hast du das <IF DEFINE> denn bei den LoadModule Anweisungen auch entfernt?

Welche Distri benutzt du eigentlich? Und welche Apache Version?
hademak
Posts: 35
Joined: 2003-08-15 20:30
 

Re: SSL in Apache einbinden

Post by hademak »

duergner wrote: Hast du das <IF DEFINE> denn bei den LoadModule Anweisungen auch entfernt?

Welche Distri benutzt du eigentlich? Und welche Apache Version?
Ja hab ich entfernt.
Suse Linux 8 - Apache 1.3.19
Mehr Informationen: http://www.t-chat.net/info.php
duergner
Posts: 923
Joined: 2003-08-20 11:30
Location: Pittsburgh, PA, USA
 

Re: SSL in Apache einbinden

Post by duergner »

[quote="HademakJa hab ich entfernt.
Suse Linux 8 - Apache 1.3.19
Mehr Informationen: http://www.t-chat.net/info.php[/quote]

Hast du das SSL Modul übersetzt? Drinnen is es ja nicht, wie man sehen kann. Findet sich irgendeine Fehlermeldung wenn der Apache startet in den Logs?
Post Reply