...
#### SSL Virtual Host Context##
<VirtualHost _default_:443>
...
# General setup for the virtual host, inherited from global configuration# コメントをはずすDocumentRoot "/var/www/html" # コメントをはずすServerName www.example.com:443 # Use separate log files for the SSL virtual host; note that LogLevel# is not inherited from httpd.conf.ErrorLog logs/ssl_error_log
TransferLog logs/ssl_access_log
LogLevel warn
# SSL Engine Switch:# Enable/Disable SSL for this virtual host.SSLEngineon# SSL Protocol support:# List the enable protocol levels with which clients will be able to# connect. Disable SSLv2 access by default:SSLProtocolall -SSLv2
# SSL Cipher Suite:# List the ciphers that the client is permitted to negotiate.# See the mod_ssl documentation for a complete list.SSLCipherSuiteALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
# Server Certificate:# Point SSLCertificateFile at a PEM encoded certificate. If# the certificate is encrypted, then you will be prompted for a# pass phrase. Note that a kill -HUP will prompt again. A new# certificate can be generated using the genkey(1) command.#SSLCertificateFile /etc/pki/tls/certs/localhost.crt# サーバー証明書のパスを指定SSLCertificateFile /etc/pki/CA/certs/www.example.com.crt# Server Private Key:# If the key is not combined with the certificate, use this# directive to point at the key file. Keep in mind that if# you've both a RSA and a DSA private key you can configure# both in parallel (to also allow the use of DSA ciphers, etc.)#SSLCertificateKeyFile /etc/pki/tls/private/localhost.key# サーバー秘密鍵のパスを指定SSLCertificateKeyFile /etc/pki/CA/private/www.example.com.key
...
# Certificate Authority (CA):# Set the CA certificate verification path where to find CA# certificates for client authentication or alternatively one# huge file containing all of them (file must be PEM encoded)#SSLCACertificateFile /etc/pki/tls/certs/ca-bundle.crt# プライベート認証局証明書のパスを指定SSLCACertificateFile /etc/pki/CA/cacert.pem# 失効証明書リストのパスを指定SSLCARevocationFile /etc/pki/CA/revoke.crl# Client Authentication (Type):# Client certificate verification type and depth. Types are# none, optional, require and optional_no_ca. Depth is a# number which specifies how deeply to verify the certificate# issuer chain before deciding the certificate is not valid.# SSL接続時 クライアント証明書を要求するように指定SSLVerifyClient require# クライアント証明書を確認する階層レベルを指定(デフォルト10のままでOK)SSLVerifyDepth 10
...
</VirtualHost>
...
コメントを投稿 :