> -----Original Message-----
> From: Issac Goldstand [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, July 10, 2001 1:07 PM
> To: Geoffrey Young
> Cc: [EMAIL PROTECTED]
> Subject: Re: detecting ssl
> 
> 
> > > -----Original Message-----
> > > From: Issac Goldstand [mailto:[EMAIL PROTECTED]]
> > > Sent: Tuesday, July 10, 2001 10:44 AM
> > > To: Geoffrey Young; 'João Pedro Gonçalves'; brian moseley
> > > Cc: [EMAIL PROTECTED]
> > > Subject: Re: detecting ssl
> > >
> > >
> > > Not necessarily.  I could easily set up any virtualhost on
> > > port 443 which
> > > will be accessable by https://nasty.servername/ but will, in
> > > reality, not
> > > necessarily be over a secure connection.
> >
> > what would negotiate the https protocol then?  its not like 
> you can just
> set
> > up to listen on 443, make
> > a an http request, and Apache will serve it - at least not through a
> browser
> > or telnet.
> 
> Of course it will!!!  

whoops, I meant an https request - of course you can listen on any port you
want for plain http.

[snip]

> Also, 
> if I'd use a
> simple client that just used https as port 443 without 
> automatically trying
> to use a secure layer (which is actually proper...), I could even grab
> https:// from the URI request.

ok, I'm not claiming to be an ssl expert, so how would one do that?  if I do

telnet my.ssl-enabled.server 443
GET / HTTP/1.0

I get 400 - BAD_REQUEST.  something has to negotiate the https layer, no?

I've been searching for documentation, but all I can find is the TLS spec,
which says that TLS is relegated to the scheme of 'https', so pointers to
something useful would probably be good (for all :)

> 
> The ONLY safe way, is to use mod_ssl to tell you you're using 
> it.  Consider
> a comparison: assuming you're using mod_perl by grepping the 
> server info for
> mod_perl/x.xx rather than checking $ENV{MOD_PERL}

understood

--Geoff 

Reply via email to