Project

General

Profile

How to enable redmine over https on 64 bit Windows Server... » httpd-ssl.conf

Paresh Deshmukh, 2015-06-24 13:19

 
1
#
2
# This is the Apache server configuration file providing SSL support.
3
# It contains the configuration directives to instruct the server how to
4
# serve pages over an https connection. For detailed information about these 
5
# directives see <URL:http://httpd.apache.org/docs/2.4/mod/mod_ssl.html>
6
# 
7
# Do NOT simply read the instructions in here without understanding
8
# what they do.  They're here only as hints or reminders.  If you are unsure
9
# consult the online docs. You have been warned.  
10
#
11
# Required modules: mod_log_config, mod_setenvif, mod_ssl,
12
#          socache_shmcb_module (for default value of SSLSessionCache)
13

    
14
#
15
# Pseudo Random Number Generator (PRNG):
16
# Configure one or more sources to seed the PRNG of the SSL library.
17
# The seed data should be of good random quality.
18
# WARNING! On some platforms /dev/random blocks if not enough entropy
19
# is available. This means you then cannot use the /dev/random device
20
# because it would lead to very long connection times (as long as
21
# it requires to make more entropy available). But usually those
22
# platforms additionally provide a /dev/urandom device which doesn't
23
# block. So, if available, use this one instead. Read the mod_ssl User
24
# Manual for more details.
25
#
26
#SSLRandomSeed startup file:/dev/random  512
27
#SSLRandomSeed startup file:/dev/urandom 512
28
#SSLRandomSeed connect file:/dev/random  512
29
#SSLRandomSeed connect file:/dev/urandom 512
30

    
31

    
32
#
33
# When we also provide SSL we have to listen to the 
34
# standard HTTP port (see above) and to the HTTPS port
35
#
36
Listen 450
37

    
38
##
39
##  SSL Global Context
40
##
41
##  All SSL configuration in this context applies both to
42
##  the main server and all SSL-enabled virtual hosts.
43
##
44

    
45
#   SSL Cipher Suite:
46
#   List the ciphers that the client is permitted to negotiate.
47
#   See the mod_ssl documentation for a complete list.
48
SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5
49

    
50
#   Speed-optimized SSL Cipher configuration:
51
#   If speed is your main concern (on busy HTTPS servers e.g.),
52
#   you might want to force clients to specific, performance
53
#   optimized ciphers. In this case, prepend those ciphers
54
#   to the SSLCipherSuite list, and enable SSLHonorCipherOrder.
55
#   Caveat: by giving precedence to RC4-SHA and AES128-SHA
56
#   (as in the example below), most connections will no longer
57
#   have perfect forward secrecy - if the server's key is
58
#   compromised, captures of past or future traffic must be
59
#   considered compromised, too.
60
#SSLCipherSuite RC4-SHA:AES128-SHA:HIGH:MEDIUM:!aNULL:!MD5
61
#SSLHonorCipherOrder on 
62

    
63
#   Pass Phrase Dialog:
64
#   Configure the pass phrase gathering process.
65
#   The filtering dialog program (`builtin' is an internal
66
#   terminal dialog) has to provide the pass phrase on stdout.
67
SSLPassPhraseDialog  builtin
68

    
69
#   Inter-Process Session Cache:
70
#   Configure the SSL Session Cache: First the mechanism 
71
#   to use and second the expiring timeout (in seconds).
72
#SSLSessionCache         "dbm:C:/Bitnami/redmine-3.0.3-0/apache2/logs/ssl_scache"
73
SSLSessionCache        "shmcb:C:/Bitnami/redmine-3.0.3-0/apache2/logs/ssl_scache(512000)"
74
SSLSessionCacheTimeout  300
75

    
76
#   OCSP Stapling (requires OpenSSL 0.9.8h or later)
77
#
78
#   This feature is disabled by default and requires at least
79
#   the two directives SSLUseStapling and SSLStaplingCache.
80
#   Refer to the documentation on OCSP Stapling in the SSL/TLS
81
#   How-To for more information.
82
#
83
#   Enable stapling for all SSL-enabled servers:
84
#SSLUseStapling On
85

    
86
#   Define a relatively small cache for OCSP Stapling using
87
#   the same mechanism that is used for the SSL session cache
88
#   above.  If stapling is used with more than a few certificates,
89
#   the size may need to be increased.  (AH01929 will be logged.)
90
#SSLStaplingCache "shmcb:C:/Bitnami/redmine-3.0.3-0/apache2/logs/ssl_stapling(32768)"
91

    
92
#   Seconds before valid OCSP responses are expired from the cache
93
#SSLStaplingStandardCacheTimeout 3600
94

    
95
#   Seconds before invalid OCSP responses are expired from the cache
96
#SSLStaplingErrorCacheTimeout 600
97

    
98
##
99
## SSL Virtual Host Context
100
##
101

    
102
<VirtualHost localhost:450>
103

    
104
#   General setup for the virtual host
105
DocumentRoot "C:/Bitnami/redmine-3.0.3-0/apache2/htdocs"
106
ServerName www.arlpunvevd.igatecorp.com:450
107
ServerAlias arlpunvevd.igatecorp.com:450
108
ServerAdmin paresh.mdeshmukh@igate.com
109
ErrorLog "C:/Bitnami/redmine-3.0.3-0/apache2/logs/error.log"
110
TransferLog "C:/Bitnami/redmine-3.0.3-0/apache2/logs/access.log"
111

    
112
#   SSL Engine Switch:
113
#   Enable/Disable SSL for this virtual host.
114
SSLEngine on
115

    
116
#   Server Certificate:
117
#   Point SSLCertificateFile at a PEM encoded certificate.  If
118
#   the certificate is encrypted, then you will be prompted for a
119
#   pass phrase.  Note that a kill -HUP will prompt again.  Keep
120
#   in mind that if you have both an RSA and a DSA certificate you
121
#   can configure both in parallel (to also allow the use of DSA
122
#   ciphers, etc.)
123
#   Some ECC cipher suites (http://www.ietf.org/rfc/rfc4492.txt)
124
#   require an ECC certificate which can also be configured in
125
#   parallel.
126
SSLCertificateFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/server.crt"
127
#SSLCertificateFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/server-dsa.crt"
128
#SSLCertificateFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/server-ecc.crt"
129

    
130
#   Server Private Key:
131
#   If the key is not combined with the certificate, use this
132
#   directive to point at the key file.  Keep in mind that if
133
#   you've both a RSA and a DSA private key you can configure
134
#   both in parallel (to also allow the use of DSA ciphers, etc.)
135
#   ECC keys, when in use, can also be configured in parallel
136
SSLCertificateKeyFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/server.key"
137
#SSLCertificateKeyFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/server-dsa.key"
138
#SSLCertificateKeyFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/server-ecc.key"
139

    
140
#   Server Certificate Chain:
141
#   Point SSLCertificateChainFile at a file containing the
142
#   concatenation of PEM encoded CA certificates which form the
143
#   certificate chain for the server certificate. Alternatively
144
#   the referenced file can be the same as SSLCertificateFile
145
#   when the CA certificates are directly appended to the server
146
#   certificate for convenience.
147
#SSLCertificateChainFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/server-ca.crt"
148

    
149
#   Certificate Authority (CA):
150
#   Set the CA certificate verification path where to find CA
151
#   certificates for client authentication or alternatively one
152
#   huge file containing all of them (file must be PEM encoded)
153
#   Note: Inside SSLCACertificatePath you need hash symlinks
154
#         to point to the certificate files. Use the provided
155
#         Makefile to update the hash symlinks after changes.
156
#SSLCACertificatePath "C:/Bitnami/redmine-3.0.3-0/apache2/conf/ssl.crt"
157
#SSLCACertificateFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/ssl.crt/ca-bundle.crt"
158

    
159
#   Certificate Revocation Lists (CRL):
160
#   Set the CA revocation path where to find CA CRLs for client
161
#   authentication or alternatively one huge file containing all
162
#   of them (file must be PEM encoded).
163
#   The CRL checking mode needs to be configured explicitly
164
#   through SSLCARevocationCheck (defaults to "none" otherwise).
165
#   Note: Inside SSLCARevocationPath you need hash symlinks
166
#         to point to the certificate files. Use the provided
167
#         Makefile to update the hash symlinks after changes.
168
#SSLCARevocationPath "C:/Bitnami/redmine-3.0.3-0/apache2/conf/ssl.crl"
169
#SSLCARevocationFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/ssl.crl/ca-bundle.crl"
170
#SSLCARevocationCheck chain
171

    
172
#   Client Authentication (Type):
173
#   Client certificate verification type and depth.  Types are
174
#   none, optional, require and optional_no_ca.  Depth is a
175
#   number which specifies how deeply to verify the certificate
176
#   issuer chain before deciding the certificate is not valid.
177
#SSLVerifyClient require
178
#SSLVerifyDepth  10
179

    
180
#   TLS-SRP mutual authentication:
181
#   Enable TLS-SRP and set the path to the OpenSSL SRP verifier
182
#   file (containing login information for SRP user accounts). 
183
#   Requires OpenSSL 1.0.1 or newer. See the mod_ssl FAQ for
184
#   detailed instructions on creating this file. Example:
185
#   "openssl srp -srpvfile C:/Bitnami/redmine-3.0.3-0/apache2/conf/passwd.srpv -add username"
186
#SSLSRPVerifierFile "C:/Bitnami/redmine-3.0.3-0/apache2/conf/passwd.srpv"
187

    
188
#   Access Control:
189
#   With SSLRequire you can do per-directory access control based
190
#   on arbitrary complex boolean expressions containing server
191
#   variable checks and other lookup directives.  The syntax is a
192
#   mixture between C and Perl.  See the mod_ssl documentation
193
#   for more details.
194
#<Location />
195
#SSLRequire (    %{SSL_CIPHER} !~ m/^(EXP|NULL)/ \
196
#            and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \
197
#            and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \
198
#            and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \
199
#            and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20       ) \
200
#           or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/
201
#</Location>
202

    
203
#   SSL Engine Options:
204
#   Set various options for the SSL engine.
205
#   o FakeBasicAuth:
206
#     Translate the client X.509 into a Basic Authorisation.  This means that
207
#     the standard Auth/DBMAuth methods can be used for access control.  The
208
#     user name is the `one line' version of the client's X.509 certificate.
209
#     Note that no password is obtained from the user. Every entry in the user
210
#     file needs this password: `xxj31ZMTZzkVA'.
211
#   o ExportCertData:
212
#     This exports two additional environment variables: SSL_CLIENT_CERT and
213
#     SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
214
#     server (always existing) and the client (only existing when client
215
#     authentication is used). This can be used to import the certificates
216
#     into CGI scripts.
217
#   o StdEnvVars:
218
#     This exports the standard SSL/TLS related `SSL_*' environment variables.
219
#     Per default this exportation is switched off for performance reasons,
220
#     because the extraction step is an expensive operation and is usually
221
#     useless for serving static content. So one usually enables the
222
#     exportation for CGI and SSI requests only.
223
#   o StrictRequire:
224
#     This denies access when "SSLRequireSSL" or "SSLRequire" applied even
225
#     under a "Satisfy any" situation, i.e. when it applies access is denied
226
#     and no other module can change it.
227
#   o OptRenegotiate:
228
#     This enables optimized SSL connection renegotiation handling when SSL
229
#     directives are used in per-directory context. 
230
#SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
231
<FilesMatch "\.(cgi|shtml|phtml|php)$">
232
    SSLOptions +StdEnvVars
233
</FilesMatch>
234
<Directory "C:/Bitnami/redmine-3.0.3-0/apache2/cgi-bin">
235
    SSLOptions +StdEnvVars
236
</Directory>
237

    
238
#   SSL Protocol Adjustments:
239
#   The safe and default but still SSL/TLS standard compliant shutdown
240
#   approach is that mod_ssl sends the close notify alert but doesn't wait for
241
#   the close notify alert from client. When you need a different shutdown
242
#   approach you can use one of the following variables:
243
#   o ssl-unclean-shutdown:
244
#     This forces an unclean shutdown when the connection is closed, i.e. no
245
#     SSL close notify alert is sent or allowed to be received.  This violates
246
#     the SSL/TLS standard but is needed for some brain-dead browsers. Use
247
#     this when you receive I/O errors because of the standard approach where
248
#     mod_ssl sends the close notify alert.
249
#   o ssl-accurate-shutdown:
250
#     This forces an accurate shutdown when the connection is closed, i.e. a
251
#     SSL close notify alert is send and mod_ssl waits for the close notify
252
#     alert of the client. This is 100% SSL/TLS standard compliant, but in
253
#     practice often causes hanging connections with brain-dead browsers. Use
254
#     this only for browsers where you know that their SSL implementation
255
#     works correctly. 
256
#   Notice: Most problems of broken clients are also related to the HTTP
257
#   keep-alive facility, so you usually additionally want to disable
258
#   keep-alive for those clients, too. Use variable "nokeepalive" for this.
259
#   Similarly, one has to force some clients to use HTTP/1.0 to workaround
260
#   their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
261
#   "force-response-1.0" for this.
262
BrowserMatch "MSIE [2-5]" \
263
         nokeepalive ssl-unclean-shutdown \
264
         downgrade-1.0 force-response-1.0
265

    
266
#   Per-Server Logging:
267
#   The home of a custom SSL log file. Use this when you want a
268
#   compact non-error SSL logfile on a virtual host basis.
269
CustomLog "C:/Bitnami/redmine-3.0.3-0/apache2/logs/ssl_request.log" \
270
          "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
271

    
272
</VirtualHost>                                  
(1-1/2)