-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Just to provide a follow-up, I was able to fix the original problem by
learning some rudimentary mod_rewrite stuff as suggested by a few.
Basically, this did the trick:

<VirtualHost IP:443>
...
        RewriteEngine On
        RewriteCond %{HTTP_HOST}        !secure.domain.dom
        RewriteRule ^/(.*)              http://%{HTTP_HOST}
...
</VirtualHost>
<VirtualHost IP:80>
        ServerName secure.domain.dom
        RewriteEngine On
        RewriteCond %{SERVER_PORT}      ^80$
        RewriteRule ^/(.*)              http://domain.dom
</VirtualHost>

Result:  All https:// requests to other VHosts are redirected to their
http:// counterparts, and any http:// requests to the secure VHost are
sent to the unsecured main site.
I'm sure there is a more effective way to meet the ALWAYS_TRUE condition
done with SERVER_PORT above, but this one works for now.

Hope this helps someone in a similar position out!!

- -Phil Hagen

On Wed, 2 Jan 2002, Rajidhar Etta wrote:

> I can think of two solutions (not sure if whether both of them turns out
> to be 'NOT ELIGENT' solutions)
> 1.
> Within the virtual host section of foo.com:443, you could do the
> following:
> SetEnvIfNoCase Host bar\.com bar
> SetEnvIfNoCase Host bar\.org bar
> (above sets two environment variable bar if the HTTP header Host field
> contains bar.com OR bar.org).
> Then in your <Directory> section of DocumentRoot (say if it is /d1/d2 )
> <Directory /d1/d2>
> ...
> ...
> ..
> Allow from env!=bar
> </Directory> Which actually blocks access to any page.... You can use
> the above in <Location> Also.
>
> 2. Use mod_rewrite  (RewriteCond which checks the HOST  & RewriteRule)
> inside the virtualhost to  redirect to any error page.
>
>
>
>
> Rajidhar Etta
> eComServer, Inc
> 609.951.8500 (x 192)
> 609.203.3697 (Cell)

- -- 
http://identityvector.com/~phil/ (PGP Key, software, etc)
PGP key also at http://www.keyserver.net


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjw5AWkACgkQ/5g75OFK7JMqcQCeK9Xlcxi8XDAetUflo87Y1ZeO
qQQAn3vhYo5b/1y1G0p+8v+1K4zel2+V
=Rpn5
-----END PGP SIGNATURE-----

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to