⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 raserver.conf.example

📁 Perl写的CA认证程序
💻 EXAMPLE
📖 第 1 页 / 共 3 页
字号:
#ErrorDocument 404 /missing.html#  to redirect to local URL /missing.html#ErrorDocument 404 /cgi-bin/missing_handler.pl#  N.B.: You can redirect to a script or a document using server-side-includes.##    3) external redirects#ErrorDocument 402 http://some.other_server.com/subscription_info.html#  N.B.: Many of the environment variables associated with the original#  request will *not* be available to such a script.## The following directives modify normal HTTP response behavior.# The first directive disables keepalive for Netscape 2.x and browsers that# spoof it. There are known problems with these browser implementations.# The second directive is for Microsoft Internet Explorer 4.0b2# which has a broken HTTP/1.1 implementation and does not properly# support keepalive when it is used on 301 or 302 (redirect) responses.#BrowserMatch "Mozilla/2" nokeepaliveBrowserMatch "MSIE 4\.0b2;" nokeepalive downgrade-1.0 force-response-1.0## The following directive disables HTTP/1.1 responses to browsers which# are in violation of the HTTP/1.0 spec by not being able to grok a# basic 1.1 response.#BrowserMatch "RealPlayer 4\.0" force-response-1.0BrowserMatch "Java/1\.0" force-response-1.0BrowserMatch "JDK/1\.0" force-response-1.0## Allow server status reports, with the URL of http://servername/server-status# Change the ".your_domain.com" to match your domain to enable.##<Location /server-status>#    SetHandler server-status#    Order deny,allow#    Deny from all#    Allow from .your_domain.com#</Location>## Allow remote server configuration reports, with the URL of#  http://servername/server-info (requires that mod_info.c be loaded).# Change the ".your_domain.com" to match your domain to enable.##<Location /server-info>#    SetHandler server-info#    Order deny,allow#    Deny from all#    Allow from .your_domain.com#</Location>## There have been reports of people trying to abuse an old bug from pre-1.1# days.  This bug involved a CGI script distributed as a part of Apache.# By uncommenting these lines you can redirect these attacks to a logging # script on phf.apache.org.  Or, you can record them yourself, using the script# support/phf_abuse_log.cgi.##<Location /cgi-bin/phf*>#    Deny from all#    ErrorDocument 403 http://phf.apache.org/phf_abuse_log.cgi#</Location>## Proxy Server directives. Uncomment the following lines to# enable the proxy server:##<IfModule mod_proxy.c>#ProxyRequests On##<Directory proxy:*>#    Order deny,allow#    Deny from all#    Allow from .your_domain.com#</Directory>## Enable/disable the handling of HTTP/1.1 "Via:" headers.# ("Full" adds the server version; "Block" removes all outgoing Via: headers)# Set to one of: Off | On | Full | Block##ProxyVia On## To enable the cache as well, edit and uncomment the following lines:# (no cacheing without CacheRoot)##CacheRoot "/usr/local/apache/proxy"#CacheSize 5#CacheGcInterval 4#CacheMaxExpire 24#CacheLastModifiedFactor 0.1#CacheDefaultExpire 1#NoCache a_domain.com another_domain.edu joes.garage_sale.com#</IfModule># End of proxy directives.### Section 3: Virtual Hosts## VirtualHost: If you want to maintain multiple domains/hostnames on your# machine you can setup VirtualHost containers for them.# Please see the documentation at <URL:http://www.apache.org/docs/vhosts/># for further details before you try to setup virtual hosts.# You may use the command line option '-S' to verify your virtual host# configuration.## If you want to use name-based virtual hosts you need to define at# least one IP address (and port number) for them.#<IfDefine SSL>NameVirtualHost xx.xx.xx.xx:443NameVirtualHost yy.yy.yy.yy:4443</IfDefine>## VirtualHost example:# Almost any Apache directive may go into a VirtualHost container.##<VirtualHost ip.address.of.host.some_domain.com>#    ServerAdmin webmaster@host.some_domain.com#    DocumentRoot /www/docs/host.some_domain.com#    ServerName host.some_domain.com#    ErrorLog logs/host.some_domain.com-error_log#    CustomLog logs/host.some_domain.com-access_log common#</VirtualHost>#<VirtualHost _default_:*>#</VirtualHost>####  SSL Global Context####  All SSL configuration in this context applies both to##  the main server and all SSL-enabled virtual hosts.####   Some MIME-types for downloading Certificates and CRLs#<IfDefine SSL>AddType application/x-x509-ca-cert .crtAddType application/x-pkcs7-crl    .crl</IfDefine><IfModule mod_ssl.c>#   Pass Phrase Dialog:#   Configure the pass phrase gathering process.#   The filtering dialog program (`builtin' is a internal#   terminal dialog) has to provide the pass phrase on stdout.SSLPassPhraseDialog  builtin#   Inter-Process Session Cache:#   Configure the SSL Session Cache: First either `none'#   or `dbm:/path/to/file' for the mechanism to use and#   second the expiring timeout (in seconds).SSLSessionCache         dbm:/tmp/ssl_scacheSSLSessionCacheTimeout  300#   Semaphore:#   Configure the path to the mutual explusion semaphore the#   SSL engine uses internally for inter-process synchronization. SSLMutex  file:/usr/local/apache/logs/ssl_mutex#   Pseudo Random Number Generator (PRNG):#   Configure one or more sources to seed the PRNG of the #   SSL library. The seed data should be of good random quality.SSLRandomSeed startup builtinSSLRandomSeed connect builtin#SSLRandomSeed startup file:/dev/random  512#SSLRandomSeed startup file:/dev/urandom 512#SSLRandomSeed connect file:/dev/random  512#SSLRandomSeed connect file:/dev/urandom 512#   Logging:#   The home of the dedicated SSL protocol logfile. Errors are#   additionally duplicated in the general error log file.  Put#   this somewhere where it cannot be used for symlink attacks on#   a real server (i.e. somewhere where only root can write).#   Log levels are (ascending order: higher ones include lower ones):#   none, error, warn, info, trace, debug.SSLLog      /usr/local/apache/logs/ssl_engine_logSSLLogLevel info</IfModule><IfDefine SSL>#### SSL Virtual Host Context##<VirtualHost xx.xx.xx.xx:4443>ServerName raserver.yourdomain.orgDocumentRoot /home/httpd/htdocs-raserverScriptAlias /cgi-bin/ "/home/httpd/cgi-raserver/"ServerAdmin webmaster@yourdomain.orgErrorLog logs/raserver-error_logCustomLog logs/raserver-access_log commonSSLEngine on#   SSL Cipher Suite:#   List the ciphers that the client is permitted to negotiate.#   See the mod_ssl documentation for a complete list.#SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL#   Server Certificate:#   Point SSLCertificateFile at a PEM encoded certificate.  If#   the certificate is encrypted, then you will be prompted for a#   pass phrase.  Note that a kill -HUP will prompt again. A test#   certificate can be generated with `make certificate' under#   built time.SSLCertificateFile    /usr/local/apache/conf/ssl.crt/raserver.crt#   Server Private Key:#   If the key is not combined with the certificate, use this#   directive to point at the key file.SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/raserver.key#   Certificate Authority (CA):#   Set the CA certificate verification path where to find CA#   certificates for client authentication or alternatively one#   huge file containing all of them (file must be PEM encoded)#   Note: Inside SSLCACertificatePath you need hash symlinks#         to point to the certificate files. Use the provided#         Makefile to update the hash symlinks after changes.#SSLCACertificatePath    /usr/local/apache/conf/ssl.crtSSLCACertificateFile    /usr/local/apache/conf/ssl.crt/cacert.crt#   Client Authentication (Type):#   Client certificate verification type and depth.  Types are#   none, optional, require and optional_no_ca.  Depth is a#   number which specifies how deeply to verify the certificate#   issuer chain before deciding the certificate is not valid.SSLVerifyClient requireSSLVerifyDepth  10#   Access Control:#   With SSLRequire you can do per-directory access control based#   on arbitrary complex boolean expressions containing server#   variable checks and other lookup directives.  The syntax is a#   mixture between C and Perl.  See the mod_ssl documentation#   for more details.#<Location />#SSLRequire (    %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \#            and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \#            and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \#            and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \#            and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20       ) \#           or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/#</Location>#   SSL Engine Options:#   Set various options for the SSL engine.#   FakeBasicAuth:#     Translate the client X.509 into a Basic Authorisation.  This means that#     the standard Auth/DBMAuth methods can be used for access control.  The#     user name is the `one line' version of the client's X.509 certificate.#     Note that no password is obtained from the user. Every entry in the user#     file needs this password: `xxj31ZMTZzkVA'.#   ExportCertData:#     This exports two additional environment variables: SSL_CLIENT_CERT and#     SSL_SERVER_CERT. These contain the PEM-encoded certificates of the#     server (always existing) and the client (only existing when client#     authentication is used). This can be used to import the certificates#     into CGI scripts.#   CompatEnvVars:#     This exports obsolete environment variables for backward compatibility#     to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold 2.x. Use this#     to provide compatibility to existing CGI scripts.#SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVarsSSLOptions +StdEnvVars#   Per-Server Logging:#   The home of a custom SSL log file. Use this when you want a#   compact non-error SSL logfile on a virtual host basis.CustomLog /usr/local/apache/logs/raserver-ssl_request_log \          "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"</VirtualHost>                                  <VirtualHost yy.yy.yy.yy:443>ServerName secure.yourdomain.orgDocumentRoot /home/httpd/htdocs-publicScriptAlias "/cgi-bin/" "/home/httpd/cgi-public/"ServerAdmin webmaster@yourdomain.orgErrorLog logs/secure-error_logCustomLog logs/secure-access_log common#   SSL Engine Switch:#   Enable/Disable SSL for this virtual host.SSLEngine on#   SSL Cipher Suite:#   List the ciphers that the client is permitted to negotiate.#   See the mod_ssl documentation for a complete list.#SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL#   Server Certificate:#   Point SSLCertificateFile at a PEM encoded certificate.  If#   the certificate is encrypted, then you will be prompted for a#   pass phrase.  Note that a kill -HUP will prompt again. A test#   certificate can be generated with `make certificate' under#   built time.SSLCertificateFile    /usr/local/apache/conf/ssl.crt/secure.crt#   Server Private Key:#   If the key is not combined with the certificate, use this#   directive to point at the key file.SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/secure.key#   Certificate Authority (CA):#   Set the CA certificate verification path where to find CA#   certificates for client authentication or alternatively one#   huge file containing all of them (file must be PEM encoded)#   Note: Inside SSLCACertificatePath you need hash symlinks#         to point to the certificate files. Use the provided#         Makefile to update the hash symlinks after changes.#SSLCACertificatePath    /usr/local/apache/conf/ssl.crtSSLCACertificateFile    /usr/local/apache/conf/ssl.crt/cacert.crt#   Client Authentication (Type):#   Client certificate verification type and depth.  Types are#   none, optional, require and optional_no_ca.  Depth is a#   number which specifies how deeply to verify the certificate#   issuer chain before deciding the certificate is not valid.SSLVerifyClient none#SSLVerifyDepth  10#   Access Control:#   With SSLRequire you can do per-directory access control based#   on arbitrary complex boolean expressions containing server#   variable checks and other lookup directives.  The syntax is a#   mixture between C and Perl.  See the mod_ssl documentation#   for more details.#<Location />#SSLRequire (    %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \#            and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \#            and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \#            and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \#            and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20       ) \#           or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/#</Location>#   SSL Engine Options:#   Set various options for the SSL engine.#   FakeBasicAuth:#     Translate the client X.509 into a Basic Authorisation.  This means that#     the standard Auth/DBMAuth methods can be used for access control.  The#     user name is the `one line' version of the client's X.509 certificate.#     Note that no password is obtained from the user. Every entry in the user#     file needs this password: `xxj31ZMTZzkVA'.#   ExportCertData:#     This exports two additional environment variables: SSL_CLIENT_CERT and#     SSL_SERVER_CERT. These contain the PEM-encoded certificates of the#     server (always existing) and the client (only existing when client#     authentication is used). This can be used to import the certificates#     into CGI scripts.#   CompatEnvVars:#     This exports obsolete environment variables for backward compatibility#     to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold 2.x. Use this#     to provide compatibility to existing CGI scripts.#SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVarsSSLOptions +StdEnvVars#   Per-Server Logging:#   The home of a custom SSL log file. Use this when you want a#   compact non-error SSL logfile on a virtual host basis.CustomLog /usr/local/apache/logs/secure-ssl_request_log \          "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"</VirtualHost>                                  </IfDefine>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -