On Wed, May 31, 2000 at 09:15:31AM -0600, Joel Smith wrote:
> 
> I need the local users to use HTTPS also, since they will be authenticating with
> username/password.  I don't like stuff flying around in the clear.  That's why it's 
>trickier.
> Is their a directive that says "Require cert unless originating from  IP address
> xxx.xxx.xxx.xxx"?  Your idea is similar to the different virtual host solution I 
>proposed.  i.e.
> give one url to internal people, another to external, and the internal vhost will 
>only talk to
> LAN users, the external will require a cert, but since our whole company is passing 
>around
> intranet URLs all the time, it's not practical to train users to send both urls, or 
>for people
> to figure out why a given URL isn't working for them.  I wan one host, https, that 
>can decide if
> a cert is needed to authenticate based on originating IP address.

Ah, I missed the part about using https locally - that changes my suggestion a bit.
You could make it real simple by giving your machine two ip adresses amd making two
https virtual hosts - one accepting local connections without certs and the other
requiring certs. Alternatively you could set up something based on 
SSLVerifyClient optional (http://www.modssl.org/docs/2.6/ssl_reference.html#ToC17)
which will give the clients an option of presenting a cert and then with SSLRequire
handle the different cases about ip address and wether to require a client cert.


vh

Mads Toftum
-- 
`Darn it, who spiked my coffee with water?!' - lwall

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to