Hello Owen,

Boyle Owen wrote:
-----Original Message-----
From: Dave Paris [mailto:[EMAIL PROTECTED]

snip... You claim to have spent two MONTHS trying to find what I found in under 10 SECONDS.

Anyway, the point I'm making is that the original poster is obviously a
seasoned hacker (he uses openssl from the command line!) and as such
should be welcome on this list and congratulated for using mod_ssl... So
could we be a bit friendlier please?

Especially since that what he wanted to do seems to be IP based VH...

I am currently running about 15 virtual hosts using name based on port 80, and 1 virtual host using SSL.


Please read:

My SSL host is currently working with the following:

<VirtualHost _default_:443>

However I want to change this to the IP based hosting for this host, allowing me to then add more SSL based virtual hosts on this setup, so I tried changing this to the following:

<VirtualHost 203.xxx.xxx.xxx:443>
[...]
By doing this my SSL virtual host stops working altogether.

Seems he knows that NBVH is not possible, and got his IP based VH wrong...

I try the following to debug it on a remote machine:

# openssl s_client -connect 203.xxx.xxx.xxx:443
CONNECTED(00000003)
27604:error:140770FC:SSL

With such problems it is best do do an telnet 203.xxx.xxx.xxx 443 to test if the server suddenly wants to speak plain HTTP...

I do the exact same thing on the local machine and it responds with a valid SSL response.

Can anyone suggest might be wrong here?

Sorry, not me...

Bye

Goetz

--
Goetz Babin-Ebell, TC TrustCenter AG, http://www.trustcenter.de
Sonninstr. 24-28, 20097 Hamburg, Germany
Tel.: +49-(0)40 80 80 26 -0,  Fax: +49-(0)40 80 80 26 -126

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature



  • RE: Boyle Owen
    • Götz Babin-Ebell

Reply via email to