Hi Brendon,
this is my Virtual-Host-configuration; I have Apache 1.3.14, mod_ssl 2.7.1
and openssl 0.9.6 running on COL 2.3. It works fine on both browsers
(Netscape 4.7 and MSIE 5.5), even with a dummy-cert.
#### Section 2: Main Server Configuration
#Port: port to which the stand-alone server listens
#Port 80
Port 443
#SSL Support: standard https-port
<IfDefine SSL>
#Listen 80
Listen 443
</IfDefine>
....
<IfDefine SSL>
AddType application/x-x509-ca-cert .crt
AddType application/x-pkcs7-crl .crl
</IfDefine>
<IfModule mod_ssl.c>
#PassPhraseDialog:
SSLPassPhraseDialog builtin
#Inter Process Session Cache
SSLSessionCache dbm:/etc/httpd/logs/ssl_cache
SSLSessionCacheTimeout 300
#Semaphore:inter-process synchronization;
SSLMutex file:/etc/httpd/logs/ssl_mutex
#Pseudo Random Number Generator (PRNG)
SSLRandomSeed startup builtin
SSLRandomSeed connect builtin
#Logging:.
SSLLog /etc/httpd/logs/ssl_engine_log
#Log Levels none, error, warn, info, trace, debug
SSLLogLevel info
</IfModule>
<IfDefine SSL>
####SSL Virtual Host Context
<VirtualHost _default_:443>
DocumentRoot "/etc/httpd/htdocs"
ServerName server.company.com
ServerAdmin [EMAIL PROTECTED]
ErrorLog /etc/httpd/logs/error_log
TransferLog /etc/httpd/logs/access_log
#SSl engine switch
#Enable/Disable SSL
SSLEngine on
#SSLCipherSuite
SSLCipherSuite HIGH:MEDIUM:LOW:EXP:-SSLv2
#allow all ciphers for the initial handshake,
#so export browsers can upgrade via SGC facility
<Directory "/etc/httpd/htdocs">
#but finally deny all browsers which haven`t upgraded
#SSLRequire %{SSL_CIPHER_USEKEYSIZE} >=128
</Directory>
#Server certificate
SSLCertificateFile /etc/httpd/conf/ssl.crt/server.crt
#Server Private Key
SSLCertificateKeyFile /etc/httpd/conf/ssl.key/server.key
#ServerCertificateChain: .
#SSLCertificateChainFile /etc/httpd/conf/ssl.crt/ca.crt
#Certificate Authority
#SSLCACertificatePath /etc/httpd/conf/ssl.crt
#SSLCACertificateFile /etc/httpd/conf/ssl.crt/ca-bundle.crt
#Certificate Revocation Lists (CRL)
#SSLCARevocationPath /etc/httpd/conf/ssl.crl
#SSLCARevocationFile /etc/httpd/conf/ssl.crl/ca-bundle.crl
#Client-Authentication
#SSLVerifyClient require
#SSLVerifyDepth 10
# Access Control:
# With SSLRequire you can do per-directory access control based
# on arbitrary complex boolean expressions containing server
# variable checks and other lookup directives. The syntax is a
# mixture between C and Perl. See the mod_ssl documentation
# for more details.
#<Location />
#SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \
# and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \
# and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \
# and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \
# and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 ) \
# or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/
#</Location>
#SSLEngine Options
SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVars +StrictRequire
#If CGI, uncomment
#<Files ~ "\.(cgi|shtml)$">
# SSLOptions +StdEnvVars
#</Files>
#<Directory "/etc/httpd/cgi-bin">
# SSLOptions +StdEnvVars
#</Directory>
#SSLProtocol Adjustments
SetEnvIf User-Agent ".*MSIE.*" \
nokeepalive ssl-unclean-shutdown \
downgrade-1.0 force-response-1.0
#Per server Logging
CustomLog /etc/httpd/logs/ssl_request_log \
"%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
</VirtualHost>
</IfDefine>
Maybe this is a little help or brings you some new inspirations on your
problem. Good luck!
Elke
Elke Hiendl
Beraterin f�r System- und Netzwerkmanagement
iteratec
Gesellschaft f�r iterative Softwaretechnologien mbH
Inselkammerstra�e 4
82008 M�nchen-Unterhaching
Telefon +49 89 61 45 51 - 35
Fax +49 89 61 45 51 - 10
www http://www.iteratec.de
mailto:[EMAIL PROTECTED]
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]