I think it's just the way you use allow, deny. I would have put this myself:

     Order                   deny,allow
     Deny                    from all
     Allow                   from 127.0.0.1, 199.85.99.

The Allow syntax has always seemed odd to me. What appears in the
documentation at http://httpd.apache.org/docs/mod/mod_access.html#allow
doesn't all work for me.

- 
John Airey, BSc (Jt Hons), CNA, RHCE
Internet systems support officer, ITCSD, Royal National Institute of the
Blind,
Bakewell Road, Peterborough PE2 6XU,
Tel.: +44 (0) 1733 375299 Fax: +44 (0) 1733 370848 [EMAIL PROTECTED] 

Reality TV - the ultimate oxymoron


> -----Original Message-----
> From: Harald Koch [mailto:[EMAIL PROTECTED]]
> Sent: 22 September 2002 23:53
> To: [EMAIL PROTECTED]
> Subject: certificate + network ACL + passwords problem?
> 
> 
> I've tried this both with the stock (fully patched) RedHat 
> 7.2, and with
> a fresh-built Apache 1.3.26 + modssl-2.8.10-1.3.26 + openssl-0.9.6g.
> 
> With the attached config snippet for a "private" directory, 
> based on the
> samples from the documentation, the webserver first asks me for my
> certificate, successfully validates it, and *then* asks me for a
> username/password. I know the certificate is successfully 
> authenticated,
> as I've modified my CustomLog entry to log the values of
> SSL_CLIENT_S_DN, SSL_CLIENT_VERIFY, and SSL_CIPHER_USEKEYSIZE.
> 
> If I comment out the four lines for network-based access control:
> 
>     #Order                   deny,allow
>     #Deny                    from all
>     #Allow                   from 127.0.0.1
>     #Allow                   from 199.85.99.0/24
> 
> Then I get my expected behaviour, which is:
> - if I give a certificate, I get access
> - if I don't give a certificate, I am asked for username/password
> 
> Am I being dense about combining access control methods, or is there a
> bug somewhere?
> 
> Thanks in advance,
> 
> -- 
> Harald Koch     <[EMAIL PROTECTED]>
> 
> "It takes a child to raze a village."
>               -Michael T. Fry
> 
> 
> <Directory /var/www/html/private>
>     #       any "intranet' access is allowed
>     #       but from the Internet only HTTPS + Strong-Cipher 
> + Password
>     #       or the alternative HTTPS + Strong-Cipher + 
> Client-Certificate
> 
>     #       If HTTPS is used, make sure a strong cipher is used.
>     # Additionally, allow client certs as an alternative to 
> basic auth.
>     SSLRequireSSL
>     SSLVerifyClient         optional
>     SSLVerifyDepth          2
>     SSLOptions              -StrictRequire +OptRenegotiate +StdEnvVars
>     SSLRequire ( %{SSL_CIPHER_USEKEYSIZE} >= 128 and 
> %{SSL_CLIENT_VERIFY} eq "SUCCESS" )
> 
>     #   Allow any of certs, network access or basic auth
>     Satisfy                 any
> 
>     #   Network Access Control
>     Order                   deny,allow
>     Deny                    from all
>     Allow                   from 127.0.0.1
>     Allow                   from 199.85.99.0/24
> 
>     #   HTTP Basic Authentication
>     AuthType                Basic
>     AuthName                "CFRQ users"
>     AuthUserFile            /etc/httpd/conf/passwd
>     Require                 valid-user
> </Directory>
> ______________________________________________________________________
> Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> User Support Mailing List                      [EMAIL PROTECTED]
> Automated List Manager                            [EMAIL PROTECTED]
> 

- 

NOTICE: The information contained in this email and any attachments is 
confidential and may be legally privileged. If you are not the 
intended recipient you are hereby notified that you must not use, 
disclose, distribute, copy, print or rely on this email's content. If 
you are not the intended recipient, please notify the sender 
immediately and then delete the email and any attachments from your 
system.

RNIB has made strenuous efforts to ensure that emails and any 
attachments generated by its staff are free from viruses. However, it 
cannot accept any responsibility for any viruses which are 
transmitted. We therefore recommend you scan all attachments.

Please note that the statements and views expressed in this email 
and any attachments are those of the author and do not necessarily 
represent those of RNIB.

RNIB Registered Charity Number: 226227

Website: http://www.rnib.org.uk 
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to