I'm not quite sure if this is OT but...
This works quite well:
<VirtualHost ...:80>
ProxyPass / http://machine.dff.local:8100/
ProxyPassReverse / http://machine.dff.local:8100/
<Directory proxy:*>
Order deny,allow
Allow from all
</Directory>
</VitrualHost>
This is how way we have our apache webserver in
the perimeter net and just allow specific reverse
proxy connection from the perimeter net into our
intranet.
internet
|
[firewall]--[apache reverse proxy]
| /
| /
[machine]
I now want all perimeter <-> intranet communication
to be encrypted. Therefor I want apache to just pass
the SSL communication back and forth:
<VirtualHost ...:443> <---- SSL port but no cert and SSLEngine off
ProxyPass / https://machine.dff.local/
ProxyPassReverse / https://machine.dff.local/
<Directory proxy:*>
Order deny,allow
Allow from all
</Directory>
</VitrualHost>
But this seems not to work...
Can this work at all?
(I wonder if a "ProxyPassReverse" can work on encrypted connections?)
I just read in the news something about enhanced mod_ssl
support for mod_proxy.
So forgive me if this was something different... ;)
--
Torsten
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]