> -----Urspr�ngliche Nachricht-----
> Von:  John Ott [SMTP:[EMAIL PROTECTED]]
> Gesendet am:  Donnerstag, 10. Mai 2001 16:37
> An:   [EMAIL PROTECTED]
> Betreff:      Re: Network Error: Connection refused
> 
> Henning von Bargen wrote:
> 
> > Is there nobody in this list who can help me?
> > I _guess_ it's a simple configuration problem,
> > but I didn't find an answer in the FAQ or in the mailing-list archive.
> > pls help
> > Henning
> >
> 
> >Network Error: Connection refused
> >
> 
> This usually means there is no service running on the port
> you tried to connect to.
> 
> Did you try to connect https and   do ./apachectl start
> instead of ./apachectl startssl  ?

The server is running on NT as a service :-)
SSL on port 443 is working,
I can access the site with Microsoft Internet Explorer 5.5 or Opera 4.0.2,
only Netscape Navigator gives an error message.

> 
> >
> > > -----Urspr�ngliche Nachricht-----
> > > Von:  Henning von Bargen [SMTP:[EMAIL PROTECTED]]
> > > Gesendet am:  Mittwoch, 9. Mai 2001 11:23
> > > An:   [EMAIL PROTECTED]
> > > Betreff:      RE: Network Error: Connection refused
> > >
> > > I discovered that I could partially work around this problem by
> > configuring
> > > the Netscape browser as follows:
> > > In Security Info / Navigator / Configure SSL v3 :
> > > [x] RC4 encryption with a 128-bit key and an MD5 MAC (When
> > >      permitted)
> > > [x] FIPS 140-1 compliant triple DES encryption and SHA-1 MAC (When
> > >      permitted)
> > > [x] Triple DES encryption with a 168-bit key and a SHA-1 MAC (When
> > >      permitted)
> > > [  ] RC4 encryption with a 56-bit key and a SHA-1 MAC
> > > [  ] DES encryption in CBC mode with a 56-bit key and a SHA-1 MAC
> > > [  ] RC4 encryption with a 40-bit key and an MD5 MAC
> > > [  ] RC2 encryption with a 40-bit key and an MD5 MAC
> > > [  ] No encryption with an MD5 MAC
> > > That is, I cleared the checkboxes 4,5,6,7 which were checked by
default.
> > >
> > > However, when I open the page now, I get a messagebox:
> > > New Site Certificate
> > > Certificate for: ...
> > > Signed by: Verisign Trust Network
> > > Encryption: Export Grade (RC4-Export with 40-bit
> > >                secret key)
> > >
> > > shouldn't it be possible with a Verisign Global Server ID to
> > > have 128 bit encryption with Netscape 4.7, too?
> > > And why does Netscape Navigator complain about the certificate at all
> > > whereas Internet Explorer doesn't?
> > >
> > > Please help.
> > >
> > > Henning
> > >
> > > > -----Urspr�ngliche Nachricht-----
> > > > Von:        Henning von Bargen
[SMTP:[EMAIL PROTECTED]]
> > > > Gesendet am:        Dienstag, 8. Mai 2001 16:13
> > > > An: [EMAIL PROTECTED]
> > > > Betreff:    Network Error: Connection refused
> > > >
> > > > We have a web site running
> > > > Oracle iAS 1.0.1 for NT alias Apache 1.3.12 / mod_ssl 2.6.4 /
OpenSSL
> > > 0.9.5a
> > > > on a Windows NT 4 workstation.
> > > > It has a Verisign Global Server ID installed.
> > > > I can access the SSL pages fine with Microsoft IE 5.0, 5.5 and KDE
2.1
> > > > Konqueror.
> > > >
> > > > However, when I try to access an SSL page with Netscape 4.7,
> > > > I get the following error message box:
> > > > Netscape
> > > > A network error occured while Netscape was receiving data.
> > > > (Network Error: Connection refused)
> > > > Try connecting again.
> > > >
> > > > Is this a Netscape bug or a server mis-configuration?
> > > >
> > > > One perhaps unusual thing is that we have a start page at
> > > > http://xxx.xxx.de/index.html
> > > > that redirects to https://xxx.xxx.de/ucl/html with
> > > > <meta http-equiv="refresh" content="1;
> > URL="https://xxx.xxx.de/ucl/html";>
> > > >
> > > > The Apache httpd.conf looks like this (excerpt).
> > > > I didn't change anything from the defaults except
> > > > ServerName, ServerAdmin, and the various certificate file locations.
> > > >
> > > > Any help is highly appreciated...
> > > >
> > > > Henning
> > > >
> > > >
> > > > ##
> > > > ## SSL Virtual Host Context
> > > > ##
> > > >
> > > > <VirtualHost _default_:443>
> > > >
> > > > #  General setup for the virtual host
> > > > DocumentRoot "D:\iAS_101\Apache\Apache\htdocs"
> > > > ServerName xxx.xxx.de
> > > > ServerAdmin [EMAIL PROTECTED]
> > > > ErrorLog logs/error_log
> > > > TransferLog logs/access_log
> > > >
> > > > #   SSL Engine Switch:
> > > > #   Enable/Disable SSL for this virtual host.
> > > > SSLEngine on
> > > >
> > > > #   SSL Cipher Suite:
> > > > #   List the ciphers that the client is permitted to negotiate.
> > > > #   See the mod_ssl documentation for a complete list.
> > > > #SSLCipherSuite
ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
> > > >
> > > > #   Server Certificate:
> > > > #   Point SSLCertificateFile at a PEM encoded certificate.  If
> > > > #   the certificate is encrypted, then you will be prompted for a
> > > > #   pass phrase.  Note that a kill -HUP will prompt again. A test
> > > > #   certificate can be generated with `make certificate' under
> > > > #   built time. Keep in mind that if you've both a RSA and a DSA
> > > > #   certificate you can configure both in parallel (to also allow
> > > > #   the use of DSA ciphers, etc.)
> > > > #SSLCertificateFile \conf\ssl.crt\server.crt
> > > > SSLCertificateFile \conf\ssl.crt\tup.crt
> > > >
> > > > #   Server Private Key:
> > > > #   If the key is not combined with the certificate, use this
> > > > #   directive to point at the key file.  Keep in mind that if
> > > > #   you've both a RSA and a DSA private key you can configure
> > > > #   both in parallel (to also allow the use of DSA ciphers, etc.)
> > > > #SSLCertificateKeyFile conf\ssl.key\server.key
> > > > SSLCertificateKeyFile conf\ssl.key\key-tup
> > > >
> > > > #   Server Certificate Chain:
> > > > #   Point SSLCertificateChainFile at a file containing the
> > > > #   concatenation of PEM encoded CA certificates which form the
> > > > #   certificate chain for the server certificate. Alternatively
> > > > #   the referenced file can be the same as SSLCertificateFile
> > > > #   when the CA certificates are directly appended to the server
> > > > #   certificate for convinience.
> > > > #SSLCertificateChainFile conf\ssl.crt\ca.crt
> > > >
> > > > #   Certificate Authority (CA):
> > > > #   Set the CA certificate verification path where to find CA
> > > > #   certificates for client authentication or alternatively one
> > > > #   huge file containing all of them (file must be PEM encoded)
> > > > #   Note: Inside SSLCACertificatePath you need hash symlinks
> > > > #         to point to the certificate files. Use the provided
> > > > #         Makefile to update the hash symlinks after changes.
> > > > #SSLCACertificateFile conf\ssl.crt\ca-bundle.crt
> > > >
> > > > #   Certificate Revocation Lists (CRL):
> > > > #   Set the CA revocation path where to find CA CRLs for client
> > > > #   authentication or alternatively one huge file containing all
> > > > #   of them (file must be PEM encoded)
> > > > #   Note: Inside SSLCARevocationPath you need hash symlinks
> > > > #         to point to the certificate files. Use the provided
> > > > #         Makefile to update the hash symlinks after changes.
> > > > #SSLCARevocationFile conf\ssl.crl\ca-bundle.crl
> > > >
> > > > #   Client Authentication (Type):
> > > > #   Client certificate verification type and depth.  Types are
> > > > #   none, optional, require and optional_no_ca.  Depth is a
> > > > #   number which specifies how deeply to verify the certificate
> > > > #   issuer chain before deciding the certificate is not valid.
> > > > #SSLVerifyClient require
> > > > #SSLVerifyDepth  10
> > > >
> > > > #   Access Control:
> > > > #   With SSLRequire you can do per-directory access control based
> > > > #   on arbitrary complex boolean expressions containing server
> > > > #   variable checks and other lookup directives.  The syntax is a
> > > > #   mixture between C and Perl.  See the mod_ssl documentation
> > > > #   for more details.
> > > > #<Location />
> > > > #SSLRequire (    %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \
> > > > #            and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \
> > > > #            and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \
> > > > #            and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \
> > > > #            and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20       ) \
> > > > #           or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/
> > > > #</Location>
> > > >
> > > > #   SSL Engine Options:
> > > > #   Set various options for the SSL engine.
> > > > #   o FakeBasicAuth:
> > > > #     Translate the client X.509 into a Basic Authorisation.  This
means
> > > > that
> > > > #     the standard Auth/DBMAuth methods can be used for access
control.
> > > The
> > > > #     user name is the `one line' version of the client's X.509
> > > certificate.
> > > > #     Note that no password is obtained from the user. Every entry
in
> > the
> > > > user
> > > > #     file needs this password: `xxj31ZMTZzkVA'.
> > > > #   o ExportCertData:
> > > > #     This exports two additional environment variables:
SSL_CLIENT_CERT
> > > and
> > > > #     SSL_SERVER_CERT. These contain the PEM-encoded certificates of
the
> > > > #     server (always existing) and the client (only existing when
client
> > > > #     authentication is used). This can be used to import the
> > certificates
> > > > #     into CGI scripts.
> > > > #   o StdEnvVars:
> > > > #     This exports the standard SSL/TLS related `SSL_*' environment
> > > > variables.
> > > > #     Per default this exportation is switched off for performance
> > > reasons,
> > > > #     because the extraction step is an expensive operation and is
> > usually
> > > > #     useless for serving static content. So one usually enables the
> > > > #     exportation for CGI and SSI requests only.
> > > > #   o CompatEnvVars:
> > > > #     This exports obsolete environment variables for backward
> > > compatibility
> > > > #     to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold
2.x.
> > Use
> > > > this
> > > > #     to provide compatibility to existing CGI scripts.
> > > > #   o StrictRequire:
> > > > #     This denies access when "SSLRequireSSL" or "SSLRequire"
applied
> > even
> > > > #     under a "Satisfy any" situation, i.e. when it applies access
is
> > > denied
> > > > #     and no other module can change it.
> > > > #   o OptRenegotiate:
> > > > #     This enables optimized SSL connection renegotiation handling
when
> > > SSL
> > > > #     directives are used in per-directory context.
> > > > #SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVars
+StrictRequire
> > > > <Files ~ "\.(cgi|shtml)$">
> > > >     SSLOptions +StdEnvVars
> > > > </Files>
> > > > <Directory "cgi-bin">
> > > >     SSLOptions +StdEnvVars
> > > > </Directory>
> > > >
> > > > #   SSL Protocol Adjustments:
> > > > #   The safe and default but still SSL/TLS standard compliant
shutdown
> > > > #   approach is that mod_ssl sends the close notify alert but
doesn't
> > wait
> > > > for
> > > > #   the close notify alert from client. When you need a different
> > shutdown
> > > > #   approach you can use one of the following variables:
> > > > #   o ssl-unclean-shutdown:
> > > > #     This forces an unclean shutdown when the connection is closed,
> > i.e.
> > > no
> > > > #     SSL close notify alert is send or allowed to received.  This
> > > violates
> > > > #     the SSL/TLS standard but is needed for some brain-dead
browsers.
> > Use
> > > > #     this when you receive I/O errors because of the standard
approach
> > > > where
> > > > #     mod_ssl sends the close notify alert.
> > > > #   o ssl-accurate-shutdown:
> > > > #     This forces an accurate shutdown when the connection is
closed,
> > i.e.
> > > a
> > > > #     SSL close notify alert is send and mod_ssl waits for the close
> > > notify
> > > > #     alert of the client. This is 100% SSL/TLS standard compliant,
but
> > in
> > > > #     practice often causes hanging connections with brain-dead
> > browsers.
> > > > Use
> > > > #     this only for browsers where you know that their SSL
> > implementation
> > > > #     works correctly.
> > > > #   Notice: Most problems of broken clients are also related to the
HTTP
> > > > #   keep-alive facility, so you usually additionally want to disable
> > > > #   keep-alive for those clients, too. Use variable "nokeepalive"
for
> > > this.
> > > > SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown
> > > >
> > > > #   Per-Server Logging:
> > > > #   The home of a custom SSL log file. Use this when you want a
> > > > #   compact non-error SSL logfile on a virtual host basis.
> > > > CustomLog logs/ssl_request_log \
> > > >           "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
> > > >
> > > > </VirtualHost>
> > > >

P.S.
Sorry, I had trouble posting to modssl-users last week.

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to