Changeset 18316 in main
- Timestamp:
- 03/26/19 21:35:11 (4 years ago)
- Location:
- adopters/uset/trunk/src/main/reverse_proxy
- Files:
-
- 1 deleted
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
adopters/uset/trunk/src/main/reverse_proxy/extra/httpd-ssl.conf
r10498 r18316 3 3 # It contains the configuration directives to instruct the server how to 4 4 # serve pages over an https connection. For detailed information about these 5 # directives see <URL:http://httpd.apache.org/docs/ trunk/mod/mod_ssl.html>5 # directives see <URL:http://httpd.apache.org/docs/2.4/mod/mod_ssl.html> 6 6 # 7 7 # Do NOT simply read the instructions in here without understanding … … 9 9 # consult the online docs. You have been warned. 10 10 # 11 # Required modules: mod_log_config, mod_setenvif, mod_ssl, 12 # socache_shmcb_module (for default value of SSLSessionCache) 11 13 12 14 # … … 44 46 ## 45 47 48 # SSL Cipher Suite: 49 # List the ciphers that the client is permitted to negotiate, 50 # and that httpd will negotiate as the client of a proxied server. 51 # See the OpenSSL documentation for a complete list of ciphers, and 52 # ensure these follow appropriate best practices for this deployment. 53 # httpd 2.2.30, 2.4.13 and later force-disable aNULL, eNULL and EXP ciphers, 54 # while OpenSSL disabled these by default in 0.9.8zf/1.0.0r/1.0.1m/1.0.2a. 55 SSLCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES 56 SSLProxyCipherSuite HIGH:MEDIUM:!MD5:!RC4:!3DES 57 58 # By the end of 2016, only TLSv1.2 ciphers should remain in use. 59 # Older ciphers should be disallowed as soon as possible, while the 60 # kRSA ciphers do not offer forward secrecy. These changes inhibit 61 # older clients (such as IE6 SP2 or IE8 on Windows XP, or other legacy 62 # non-browser tooling) from successfully connecting. 63 # 64 # To restrict mod_ssl to use only TLSv1.2 ciphers, and disable 65 # those protocols which do not support forward secrecy, replace 66 # the SSLCipherSuite and SSLProxyCipherSuite directives above with 67 # the following two directives, as soon as practical. 68 # SSLCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA 69 # SSLProxyCipherSuite HIGH:MEDIUM:!SSLv3:!kRSA 70 71 # User agents such as web browsers are not configured for the user's 72 # own preference of either security or performance, therefore this 73 # must be the prerogative of the web server administrator who manages 74 # cpu load versus confidentiality, so enforce the server's cipher order. 75 SSLHonorCipherOrder on 76 77 # SSL Protocol support: 78 # List the protocol versions which clients are allowed to connect with. 79 # Disable SSLv3 by default (cf. RFC 7525 3.1.1). TLSv1 (1.0) should be 80 # disabled as quickly as practical. By the end of 2016, only the TLSv1.2 81 # protocol or later should remain in use. 82 SSLProxyProtocol all -SSLv3 83 SSLProtocol ALL -SSLv2 -SSLv3 84 SSLCipherSuite ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS 85 46 86 # Pass Phrase Dialog: 47 87 # Configure the pass phrase gathering process. 48 # The filtering dialog program (`builtin' is a internal88 # The filtering dialog program (`builtin' is an internal 49 89 # terminal dialog) has to provide the pass phrase on stdout. 50 90 SSLPassPhraseDialog builtin … … 57 97 SSLSessionCacheTimeout 300 58 98 99 # OCSP Stapling (requires OpenSSL 0.9.8h or later) 100 # 101 # This feature is disabled by default and requires at least 102 # the two directives SSLUseStapling and SSLStaplingCache. 103 # Refer to the documentation on OCSP Stapling in the SSL/TLS 104 # How-To for more information. 105 # 106 # Enable stapling for all SSL-enabled servers: 107 #SSLUseStapling On 108 109 # Define a relatively small cache for OCSP Stapling using 110 # the same mechanism that is used for the SSL session cache 111 # above. If stapling is used with more than a few certificates, 112 # the size may need to be increased. (AH01929 will be logged.) 113 #SSLStaplingCache "shmcb:${SRVROOT}/logs/ssl_stapling(32768)" 114 115 # Seconds before valid OCSP responses are expired from the cache 116 #SSLStaplingStandardCacheTimeout 3600 117 118 # Seconds before invalid OCSP responses are expired from the cache 119 #SSLStaplingErrorCacheTimeout 600 120 59 121 ## 60 122 ## SSL Virtual Host Context … … 76 138 SSLEngine on 77 139 78 # SSL Cipher Suite:79 # List the ciphers that the client is permitted to negotiate.80 # See the mod_ssl documentation for a complete list.81 # Recent OpenSSL snapshots include Elliptic Curve Cryptograhpy (ECC)82 # cipher suites (see RFC 4492) as part of "ALL". Edit this line83 # if you need to disable any of those ciphers.84 #SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL85 SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:MEDIUM:!aNULL:!MD586 SSLHonorCipherOrder on87 140 # Server Certificate: 88 141 # Point SSLCertificateFile at a PEM encoded certificate. If … … 109 162 #SSLCertificateKeyFile "c:/Apache24/conf/server-dsa.key" 110 163 #SSLCertificateKeyFile "c:/Apache24/conf/server-ecc.key" 111 SSLCertificateKeyFile "c:/dataportal_info/ dataportal.key"164 SSLCertificateKeyFile "c:/dataportal_info/privatekey.key" 112 165 113 166 # Server Certificate Chain: … … 120 173 #SSLCertificateChainFile "c:/Apache24/conf/server-ca.crt" 121 174 #SSLCertificateChainFile "C:\Cert_apache24\dataportal.crt" 122 SSLCertificateChainFile " c:/dataportal_info/Apache_Plesk_Install.txt"175 SSLCertificateChainFile "C:\dataportal_info\bundle.txt" 123 176 124 177 … … 136 189 # Set the CA revocation path where to find CA CRLs for client 137 190 # authentication or alternatively one huge file containing all 138 # of them (file must be PEM encoded) 191 # of them (file must be PEM encoded). 192 # The CRL checking mode needs to be configured explicitly 193 # through SSLCARevocationCheck (defaults to "none" otherwise). 139 194 # Note: Inside SSLCARevocationPath you need hash symlinks 140 195 # to point to the certificate files. Use the provided … … 142 197 #SSLCARevocationPath "${SRVROOT}/conf/ssl.crl" 143 198 #SSLCARevocationFile "${SRVROOT}/conf/ssl.crl/ca-bundle.crl" 199 #SSLCARevocationCheck chain 144 200 145 201 # Client Authentication (Type): … … 150 206 #SSLVerifyClient require 151 207 #SSLVerifyDepth 10 208 209 # TLS-SRP mutual authentication: 210 # Enable TLS-SRP and set the path to the OpenSSL SRP verifier 211 # file (containing login information for SRP user accounts). 212 # Requires OpenSSL 1.0.1 or newer. See the mod_ssl FAQ for 213 # detailed instructions on creating this file. Example: 214 # "openssl srp -srpvfile ${SRVROOT}/conf/passwd.srpv -add username" 215 #SSLSRPVerifierFile "${SRVROOT}/conf/passwd.srpv" 152 216 153 217 # Access Control: -
adopters/uset/trunk/src/main/reverse_proxy/httpd.conf
r10498 r18316 35 35 # least PidFile. 36 36 # 37 38 37 Define SRVROOT "c:/Apache24" 38 39 39 ServerRoot "${SRVROOT}" 40 40 … … 100 100 LoadModule authz_user_module modules/mod_authz_user.so 101 101 LoadModule autoindex_module modules/mod_autoindex.so 102 #LoadModule brotli_module modules/mod_brotli.so 102 103 #LoadModule buffer_module modules/mod_buffer.so 103 104 #LoadModule cache_module modules/mod_cache.so … … 120 121 #LoadModule file_cache_module modules/mod_file_cache.so 121 122 #LoadModule filter_module modules/mod_filter.so 123 #LoadModule http2_module modules/mod_http2.so 122 124 #LoadModule headers_module modules/mod_headers.so 123 125 #LoadModule heartbeat_module modules/mod_heartbeat.so 124 126 #LoadModule heartmonitor_module modules/mod_heartmonitor.so 125 #LoadModule http2_module modules/mod_http2.so126 127 #LoadModule ident_module modules/mod_ident.so 127 128 #LoadModule imagemap_module modules/mod_imagemap.so … … 140 141 #LoadModule lua_module modules/mod_lua.so 141 142 #LoadModule macro_module modules/mod_macro.so 143 #LoadModule md_module modules/mod_md.so 142 144 LoadModule mime_module modules/mod_mime.so 143 145 #LoadModule mime_magic_module modules/mod_mime_magic.so … … 150 152 #LoadModule proxy_fcgi_module modules/mod_proxy_fcgi.so 151 153 #LoadModule proxy_ftp_module modules/mod_proxy_ftp.so 154 #LoadModule proxy_hcheck_module modules/mod_proxy_hcheck.so 152 155 LoadModule proxy_html_module modules/mod_proxy_html.so 153 156 LoadModule proxy_http_module modules/mod_proxy_http.so 157 #LoadModule proxy_http2_module modules/mod_proxy_http2.so 154 158 #LoadModule proxy_scgi_module modules/mod_proxy_scgi.so 159 #LoadModule proxy_uwsgi_module modules/mod_proxy_uwsgi.so 155 160 #LoadModule proxy_wstunnel_module modules/mod_proxy_wstunnel.so 156 161 #LoadModule ratelimit_module modules/mod_ratelimit.so … … 372 377 # directives as to Alias. 373 378 # 374 ScriptAlias /cgi-bin/ " c:/Apache24/cgi-bin/"379 ScriptAlias /cgi-bin/ "${SRVROOT}/cgi-bin/" 375 380 376 381 </IfModule> … … 393 398 Require all denied 394 399 </Directory> 400 401 <IfModule headers_module> 402 # 403 # Avoid passing HTTP_PROXY environment to CGI's on this or any proxied 404 # backend servers which have lingering "httpoxy" defects. 405 # 'Proxy' request header is undefined by the IETF, not listed by IANA 406 # 407 RequestHeader unset Proxy early 408 </IfModule> 395 409 396 410 <IfModule mime_module> … … 532 546 SSLRandomSeed connect builtin 533 547 </IfModule> 534 <IfModule http2_module>535 ProtocolsHonorOrder On536 Protocols h2 h2c http/1.1537 </IfModule>538 #539 # uncomment out the below to deal with user agents that deliberately540 # violate open standards by misusing DNT (DNT *must* be a specific541 # end-user choice)542 #543 #<IfModule setenvif_module>544 #BrowserMatch "MSIE 10.0;" bad_DNT545 #</IfModule>546 #<IfModule headers_module>547 #RequestHeader unset DNT env=bad_DNT548 #</IfModule>549 548 550 549 RemoteIPHeader X-Client-IP
Note: See TracChangeset
for help on using the changeset viewer.