Project

General

Profile

Internal Server Error : 500 The request was rejected by h... » httpd-ssl.conf

Rupesh Helwade, 2014-01-16 15:23

 
1
#
2
# This is the Apache server configuration file providing SSL support.
3
# It contains the configuration directives to instruct the server how to
4
# serve pages over an https connection. For detailed information about these 
5
# directives see <URL:http://httpd.apache.org/docs/2.4/mod/mod_ssl.html>
6
# 
7
# Do NOT simply read the instructions in here without understanding
8
# what they do.  They're here only as hints or reminders.  If you are unsure
9
# consult the online docs. You have been warned.  
10
#
11
# Required modules: mod_log_config, mod_setenvif, mod_ssl,
12
#          socache_shmcb_module (for default value of SSLSessionCache)
13

    
14
#
15
# Pseudo Random Number Generator (PRNG):
16
# Configure one or more sources to seed the PRNG of the SSL library.
17
# The seed data should be of good random quality.
18
# WARNING! On some platforms /dev/random blocks if not enough entropy
19
# is available. This means you then cannot use the /dev/random device
20
# because it would lead to very long connection times (as long as
21
# it requires to make more entropy available). But usually those
22
# platforms additionally provide a /dev/urandom device which doesn't
23
# block. So, if available, use this one instead. Read the mod_ssl User
24
# Manual for more details.
25
#
26
#SSLRandomSeed startup file:/dev/random  512
27
#SSLRandomSeed startup file:/dev/urandom 512
28
#SSLRandomSeed connect file:/dev/random  512
29
#SSLRandomSeed connect file:/dev/urandom 512
30

    
31

    
32
#
33
# When we also provide SSL we have to listen to the 
34
# standard HTTP port (see above) and to the HTTPS port
35
#
36
# Note: Configurations that use IPv6 but not IPv4-mapped addresses need two
37
#       Listen directives: "Listen [::]:8443" and "Listen 0.0.0.0:8443"
38
#
39
Listen 8443
40

    
41
##
42
##  SSL Global Context
43
##
44
##  All SSL configuration in this context applies both to
45
##  the main server and all SSL-enabled virtual hosts.
46
##
47

    
48
#   SSL Cipher Suite:
49
#   List the ciphers that the client is permitted to negotiate.
50
#   See the mod_ssl documentation for a complete list.
51
SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5
52

    
53
#   Speed-optimized SSL Cipher configuration:
54
#   If speed is your main concern (on busy HTTPS servers e.g.),
55
#   you might want to force clients to specific, performance
56
#   optimized ciphers. In this case, prepend those ciphers
57
#   to the SSLCipherSuite list, and enable SSLHonorCipherOrder.
58
#   Caveat: by giving precedence to RC4-SHA and AES128-SHA
59
#   (as in the example below), most connections will no longer
60
#   have perfect forward secrecy - if the server's key is
61
#   compromised, captures of past or future traffic must be
62
#   considered compromised, too.
63
#SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:MEDIUM:!aNULL:!MD5
64
#SSLHonorCipherOrder on 
65

    
66
#   Pass Phrase Dialog:
67
#   Configure the pass phrase gathering process.
68
#   The filtering dialog program (`builtin' is an internal
69
#   terminal dialog) has to provide the pass phrase on stdout.
70
SSLPassPhraseDialog  builtin
71

    
72
#   Inter-Process Session Cache:
73
#   Configure the SSL Session Cache: First the mechanism 
74
#   to use and second the expiring timeout (in seconds).
75
#SSLSessionCache         "dbm:/opt/Redmine/apache2/logs/ssl_scache"
76
SSLSessionCache        "shmcb:/opt/Redmine/apache2/logs/ssl_scache(512000)"
77
SSLSessionCacheTimeout  300
78

    
79
#-------------------------
80
<VirtualHost *:8080> 
81
  ServerName helpdesk.myOrg.com
82

    
83
  RewriteEngine On
84

    
85
  # Redirect any non HTTPS requests to the HTTPS server
86
     RewriteCond %{HTTP_HOST} ^myOrgshelpdesk.myOrg.com$ [NC]
87
       RewriteRule ^(.*)$ https://myOrgshelpdesk.myOrg.com$1 [R=301,L]
88
  
89
         Include /etc/apache2/common/hide-svn
90
           Include /etc/apache2/common/deflate
91
  
92
           </VirtualHost>
93

    
94

    
95

    
96
#-------------------------
97

    
98

    
99
##
100
## SSL Virtual Host Context
101
##
102

    
103

    
104
<VirtualHost _default_:8443>
105

    
106
RewriteEngine On
107
RewriteCond %{HTTPS} !=on
108
RewriteRule ^/(.*) https://%{145.67.74.673:8080/redmine}/$1 [R,L]
109

    
110

    
111
#   General setup for the virtual host
112
DocumentRoot "/opt/Redmine/apache2/htdocs"
113
ServerName myOrgshelpdesk.myOrg.com
114
ServerAdmin rupesh.helwade@example.com
115
ErrorLog "/opt/Redmine/apache2/logs/error_log"
116
TransferLog "/opt/Redmine/apache2/logs/access_log"
117

    
118
#   SSL Engine Switch:
119
#   Enable/Disable SSL for this virtual host.
120
SSLEngine on
121

    
122
#   Server Certificate:
123
#   Point SSLCertificateFile at a PEM encoded certificate.  If
124
#   the certificate is encrypted, then you will be prompted for a
125
#   pass phrase.  Note that a kill -HUP will prompt again.  Keep
126
#   in mind that if you have both an RSA and a DSA certificate you
127
#   can configure both in parallel (to also allow the use of DSA
128
#   ciphers, etc.)
129
#   Some ECC cipher suites (http://www.ietf.org/rfc/rfc4492.txt)
130
#   require an ECC certificate which can also be configured in
131
#   parallel.
132

    
133
SSLCertificateFile "/opt/Redmine/apache2/conf/server.crt"
134

    
135
#Tried by Rupesh 
136
RequestHeader set X_FORWARDED_PROTO "https"
137

    
138
#SSLCertificateFile "/opt/Redmine/apache2/conf/server-dsa.crt"
139
#SSLCertificateFile "/opt/Redmine/apache2/conf/server-ecc.crt"
140

    
141
#   Server Private Key:
142
#   If the key is not combined with the certificate, use this
143
#   directive to point at the key file.  Keep in mind that if
144
#   you've both a RSA and a DSA private key you can configure
145
#   both in parallel (to also allow the use of DSA ciphers, etc.)
146
#   ECC keys, when in use, can also be configured in parallel
147
SSLCertificateKeyFile "/opt/Redmine/apache2/conf/server.key"
148

    
149

    
150

    
151
#SSLCertificateKeyFile "/opt/Redmine/apache2/conf/server-dsa.key"
152
#SSLCertificateKeyFile "/opt/Redmine/apache2/conf/server-ecc.key"
153

    
154
#   Server Certificate Chain:
155
#   Point SSLCertificateChainFile at a file containing the
156
#   concatenation of PEM encoded CA certificates which form the
157
#   certificate chain for the server certificate. Alternatively
158
#   the referenced file can be the same as SSLCertificateFile
159
#   when the CA certificates are directly appended to the server
160
#   certificate for convenience.
161
#SSLCertificateChainFile "/opt/Redmine/apache2/conf/server-ca.crt"
162

    
163
#   Certificate Authority (CA):
164
#   Set the CA certificate verification path where to find CA
165
#   certificates for client authentication or alternatively one
166
#   huge file containing all of them (file must be PEM encoded)
167
#   Note: Inside SSLCACertificatePath you need hash symlinks
168
#         to point to the certificate files. Use the provided
169
#         Makefile to update the hash symlinks after changes.
170
#SSLCACertificatePath "/opt/Redmine/apache2/conf/ssl.crt"
171
#SSLCACertificateFile "/opt/Redmine/apache2/conf/ssl.crt/ca-bundle.crt"
172

    
173
#   Certificate Revocation Lists (CRL):
174
#   Set the CA revocation path where to find CA CRLs for client
175
#   authentication or alternatively one huge file containing all
176
#   of them (file must be PEM encoded).
177
#   The CRL checking mode needs to be configured explicitly
178
#   through SSLCARevocationCheck (defaults to "none" otherwise).
179
#   Note: Inside SSLCARevocationPath you need hash symlinks
180
#         to point to the certificate files. Use the provided
181
#         Makefile to update the hash symlinks after changes.
182
#SSLCARevocationPath "/opt/Redmine/apache2/conf/ssl.crl"
183
#SSLCARevocationFile "/opt/Redmine/apache2/conf/ssl.crl/ca-bundle.crl"
184
#SSLCARevocationCheck chain
185

    
186
#   Client Authentication (Type):
187
#   Client certificate verification type and depth.  Types are
188
#   none, optional, require and optional_no_ca.  Depth is a
189
#   number which specifies how deeply to verify the certificate
190
#   issuer chain before deciding the certificate is not valid.
191
#SSLVerifyClient require
192
#SSLVerifyDepth  10
193

    
194
#   TLS-SRP mutual authentication:
195
#   Enable TLS-SRP and set the path to the OpenSSL SRP verifier
196
#   file (containing login information for SRP user accounts). 
197
#   Requires OpenSSL 1.0.1 or newer. See the mod_ssl FAQ for
198
#   detailed instructions on creating this file. Example:
199
#   "openssl srp -srpvfile /opt/Redmine/apache2/conf/passwd.srpv -add username"
200
#SSLSRPVerifierFile "/opt/Redmine/apache2/conf/passwd.srpv"
201

    
202
#   Access Control:
203
#   With SSLRequire you can do per-directory access control based
204
#   on arbitrary complex boolean expressions containing server
205
#   variable checks and other lookup directives.  The syntax is a
206
#   mixture between C and Perl.  See the mod_ssl documentation
207
#   for more details.
208
#<Location />
209
#SSLRequire (    %{SSL_CIPHER} !~ m/^(EXP|NULL)/ \
210
#            and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \
211
#            and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \
212
#            and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \
213
#            and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20       ) \
214
#           or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/
215
#</Location>
216

    
217
#   SSL Engine Options:
218
#   Set various options for the SSL engine.
219
#   o FakeBasicAuth:
220
#     Translate the client X.509 into a Basic Authorisation.  This means that
221
#     the standard Auth/DBMAuth methods can be used for access control.  The
222
#     user name is the `one line' version of the client's X.509 certificate.
223
#     Note that no password is obtained from the user. Every entry in the user
224
#     file needs this password: `xxj31ZMTZzkVA'.
225
#   o ExportCertData:
226
#     This exports two additional environment variables: SSL_CLIENT_CERT and
227
#     SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
228
#     server (always existing) and the client (only existing when client
229
#     authentication is used). This can be used to import the certificates
230
#     into CGI scripts.
231
#   o StdEnvVars:
232
#     This exports the standard SSL/TLS related `SSL_*' environment variables.
233
#     Per default this exportation is switched off for performance reasons,
234
#     because the extraction step is an expensive operation and is usually
235
#     useless for serving static content. So one usually enables the
236
#     exportation for CGI and SSI requests only.
237
#   o StrictRequire:
238
#     This denies access when "SSLRequireSSL" or "SSLRequire" applied even
239
#     under a "Satisfy any" situation, i.e. when it applies access is denied
240
#     and no other module can change it.
241
#   o OptRenegotiate:
242
#     This enables optimized SSL connection renegotiation handling when SSL
243
#     directives are used in per-directory context. 
244
#SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
245
<FilesMatch "\.(cgi|shtml|phtml|php)$">
246
    SSLOptions +StdEnvVars
247
</FilesMatch>
248
<Directory "/opt/Redmine/apache2/cgi-bin">
249
    SSLOptions +StdEnvVars
250
</Directory>
251

    
252
#   SSL Protocol Adjustments:
253
#   The safe and default but still SSL/TLS standard compliant shutdown
254
#   approach is that mod_ssl sends the close notify alert but doesn't wait for
255
#   the close notify alert from client. When you need a different shutdown
256
#   approach you can use one of the following variables:
257
#   o ssl-unclean-shutdown:
258
#     This forces an unclean shutdown when the connection is closed, i.e. no
259
#     SSL close notify alert is sent or allowed to be received.  This violates
260
#     the SSL/TLS standard but is needed for some brain-dead browsers. Use
261
#     this when you receive I/O errors because of the standard approach where
262
#     mod_ssl sends the close notify alert.
263
#   o ssl-accurate-shutdown:
264
#     This forces an accurate shutdown when the connection is closed, i.e. a
265
#     SSL close notify alert is send and mod_ssl waits for the close notify
266
#     alert of the client. This is 100% SSL/TLS standard compliant, but in
267
#     practice often causes hanging connections with brain-dead browsers. Use
268
#     this only for browsers where you know that their SSL implementation
269
#     works correctly. 
270
#   Notice: Most problems of broken clients are also related to the HTTP
271
#   keep-alive facility, so you usually additionally want to disable
272
#   keep-alive for those clients, too. Use variable "nokeepalive" for this.
273
#   Similarly, one has to force some clients to use HTTP/1.0 to workaround
274
#   their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
275
#   "force-response-1.0" for this.
276

    
277

    
278
BrowserMatch "MSIE [2-5]" \
279
         nokeepalive ssl-unclean-shutdown \
280
         downgrade-1.0 force-response-1.0
281

    
282
#   Per-Server Logging:
283
#   The home of a custom SSL log file. Use this when you want a
284
#   compact non-error SSL logfile on a virtual host basis.
285
CustomLog "/opt/Redmine/apache2/logs/ssl_request_log" \
286
          "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
287

    
288
</VirtualHost>                                  
(1-1/6)