I'm not quite sure if this is OT but...

This works quite well:

  <VirtualHost ...:80>
   ProxyPass / http://machine.dff.local:8100/
   ProxyPassReverse / http://machine.dff.local:8100/
   <Directory proxy:*>
    Order deny,allow
    Allow from all
   </Directory>
  </VitrualHost>

This is how way we have our apache webserver in
the perimeter net and just allow specific reverse
proxy connection from the perimeter net into our
intranet.

   internet
      |
  [firewall]--[apache reverse proxy]
      |       /
      |      /
   [machine]

I now want all perimeter <-> intranet communication
to be encrypted. Therefor I want apache to just pass
the SSL communication back and forth:

  <VirtualHost ...:443>  <---- SSL port but no cert and SSLEngine off
   ProxyPass / https://machine.dff.local/
   ProxyPassReverse / https://machine.dff.local/
   <Directory proxy:*>
    Order deny,allow
    Allow from all
   </Directory>
  </VitrualHost>

But this seems not to work...
Can this work at all?
(I wonder if a "ProxyPassReverse" can work on encrypted connections?)

I just read in the news something about enhanced mod_ssl
support for mod_proxy.

So forgive me if this was something different... ;)
--
Torsten
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to