> Try the suggestions for getting a baktrace from:
> http://www.modssl.org/docs/2.6/ssl_faq.html#report-backtrace

We're not using gcc/gdb but HP's cc and xdb. I'm working on making
the debugger produce a backtrace.

> > It's like this:
> > 
> >            http            https
> >   Browser ------> Server1 -------> Server2
> > 
> > Server2 is configured to require client authetication, and
> > Server1 is configured with a proxy client cert.
> > 
>Just out of curiosity - the connection from the browser to server1 -
>is that as a proxy or is it reverse proxying?

Actually, I'm not sure. I'm not that experienced with proxy stuff.
The browser is NOT configured to use Server1 as a proxy.

Maybe I have misunderstood something. What I want to achieve is that
the user (Browser) connects to Server1 as it would to any normal web
server. Then I want Server1 to transparently fetch data from Server2
using https. For this I have configured:

  ProxyPass /appname https://Server2:port/appname

Maybe there is another way of doing this? But anyway, there clearly is
a bug in mod_ssl which I would like to help tracking down.

> >   [info]  Init: Configuring temporary DH parameters (512/1024 bits)
>
> DH? do you have both RSA and DH certs?

No, we only use RSA certs. I don't know why this DH stuff is printed.

> Remember that the SSL proxy features are "experimental". 

Sure, I am aware of that.

--
Mats Josefsson ([EMAIL PROTECTED])
RSV IT

  Mail to the address above will not be forwarded. If you want
  to reach me when I'm not at RSV, use "[EMAIL PROTECTED]" instead.

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to