Re: Problems in setting up a "HTTPS" based WebDAV server

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Latest update from "openssl" front ::


=================== MESSAGE TO openssl BEGINS HERE ==================================================
Thanks Marek (and I say again, whole-heartedly) for your quick, prompt response.


a)
RSA Key correctness  ::   VERIFIED

##############################
##########################################################################
[ajay@ajay certs]$ openssl rsa -in server.key -check -noout
Enter pass phrase for server.key:
RSA key ok
########################################################################################################





b)
modulus==Modulus && publicExponent==Exponent =====>>> TRUE

########################################################################################################
[ajay@ajay certs]$ openssl rsa -in server.key -text -noout
Enter pass phrase for server.key:
Private-Key: (2048 bit)
modulus:
    00:b9:2d:f2:59:1f:f6:c2:ac:0d:bd:0f:dd:25:e5:
    e8:7e:5b:1e:94:45:6d:be:2d:60:d6:8b:95:3a:11:
    12:90:3a:4b:b7:ef:63:be:80:90:f7:8a:ce:1e:99:
    46:11:72:23:be:f3:24:d1:5c:fe:40:ca:67:04:13:
    59:10:02:4d:2b:ac:30:15:b5:a0:ff:1a:60:6d:28:
    4a:42:dd:81:3b:26:9f:c7:d2:92:99:da:bc:c0:d3:
    60:03:4c:e7:4d:c9:64:11:c6:63:e1:78:f2:b4:9a:
    71:cd:56:a6:d5:a4:b1:c5:b4:d8:ee:5b:57:e7:80:
    f5:75:92:af:8c:cd:ba:d6:b3:d2:fd:1b:27:1d:6b:
    17:97:dc:ff:0c:31:8d:59:76:72:81:fb:51:85:02:
    db:2e:9b:b4:59:85:e5:cd:32:67:3d:7b:20:02:43:
    cb:e8:bd:c5:c7:b6:3e:15:f2:44:94:54:fb:fd:77:
    e1:f1:f2:15:7a:6d:22:d9:f3:a9:e2:a8:a2:84:1c:
    4b:cf:78:d4:6a:f2:a7:87:e2:01:d5:22:f6:e2:6c:
    e0:e7:7f:b3:32:0b:c4:01:2d:fb:9d:db:fe:44:a9:
    84:63:f0:eb:da:9d:5f:e4:73:2c:69:5d:d5:e1:80:
    5e:7c:91:45:31:b3:ee:0e:0f:5c:50:bc:3a:97:8d:
    dd:63
publicExponent: 65537 (0x10001)
privateExponent:
    05:d7:e1:51:d6:a4:5e:b8:37:26:c4:1d:62:58:c2:
    e1:59:d6:b9:2f:07:ab:7c:9b:15:aa:09:e7:6f:2a:
    7a:ca:9c:21:0d:b8:c4:06:22:8c:ed:20:5b:ee:d2:
    3b:32:b2:d6:0f:ae:15:bd:2d:78:b5:ea:52:42:9a:
    08:db:49:bc:1b:0e:d9:60:85:d8:06:e9:0c:08:bd:
    6f:26:b6:31:3b:a2:c7:17:69:f0:d8:ea:23:db:87:
    a8:13:01:29:7f:35:5d:2a:39:74:9f:f0:68:aa:86:
    f4:c7:cb:33:ea:a2:81:6e:97:79:ce:00:14:1a:09:
    a4:d0:20:21:fd:4b:ec:02:6a:e4:45:6a:24:13:dd:
    8b:81:4d:c0:37:7c:11:b1:14:09:69:7d:9f:9f:0a:
    13:c2:ce:b0:4b:56:8b:4e:0c:ff:e7:74:62:bc:f3:
    22:ca:b5:c9:5f:d0:01:28:b9:ca:d7:50:56:65:9f:
    b5:0d:d1:9e:79:f6:37:a7:bc:bd:31:45:d2:29:f5:
    88:05:a8:02:7d:21:7b:fe:78:ca:bd:f4:3c:11:16:
    3d:e0:24:f8:bf:14:0e:de:6f:01:74:36:bd:4c:4d:
    a1:fa:cb:da:74:78:5f:8a:e2:5c:41:a4:80:28:18:
    43:90:6e:82:eb:e9:50:d1:d8:86:a5:32:e4:d2:16:
    81
prime1:
    00:da:72:b7:22:b8:a2:7e:a9:23:3d:df:1e:fa:01:
    f1:07:d8:51:80:fd:8f:2d:7f:a1:f4:a6:3c:72:f2:
    9f:dc:a5:a9:1f:97:04:3a:83:10:12:f8:4c:fd:6e:
    9b:4a:d2:65:c8:9c:6d:6d:0b:a8:ff:66:7d:05:cd:
    0d:9f:74:e4:9c:ce:64:6d:00:93:1b:94:89:3d:cd:
    7e:c1:dd:32:72:60:8b:38:eb:7e:95:e7:3d:43:94:
    1a:aa:29:20:71:9c:b2:e9:19:9c:01:f2:60:5d:76:
    47:27:0d:eb:6a:aa:23:f3:a4:21:28:c2:6f:93:44:
    a9:c3:12:f5:82:53:d0:6d:33
prime2:
    00:d9:03:2c:42:99:84:8f:1b:6e:d4:4c:9c:32:24:
    df:52:96:29:af:b5:ea:4e:c2:ac:33:2f:52:81:61:
    ad:bc:db:9a:03:1e:55:1f:8a:96:5a:a9:15:e4:ed:
    90:0c:a0:9f:15:f3:dc:a4:1a:95:81:7d:f4:7b:eb:
    f9:cc:6b:0a:75:31:0a:99:bc:2e:81:db:38:e3:e4:
    fa:2d:7f:46:4e:c7:89:3b:2d:39:b4:b3:c6:7a:bc:
    fb:d0:3b:63:e1:a3:21:52:b6:b8:36:ff:78:93:04:
    4c:77:59:f6:09:f0:f9:55:19:b6:a9:a2:f5:98:18:
    ba:1a:e9:e1:44:a4:2c:ef:11
exponent1:
    00:b6:f3:12:4b:a3:04:7c:3d:dd:45:09:23:a1:50:
    94:f3:f4:08:36:96:a5:1d:fe:e1:bd:ca:a7:9f:c1:
    71:7f:52:c2:b4:b1:3e:9a:5e:7f:cc:d3:65:6f:6e:
    fd:e2:09:19:b3:8c:c6:dc:67:c2:8e:bb:e0:03:46:
    bb:9d:0b:42:17:cd:87:2f:ff:26:35:18:0e:64:d3:
    40:d0:ce:17:5c:d1:5c:68:3c:5a:54:e3:48:5c:db:
    a2:05:56:d2:54:34:5f:66:77:cb:3f:9a:25:78:c1:
    01:50:45:09:1f:d9:04:a9:1d:91:a3:d8:4b:a7:b3:
    fe:d5:60:80:7b:39:04:bb:1f
exponent2:
    33:ad:13:bf:10:3b:86:b0:6b:a5:d6:50:63:88:70:
    3d:84:50:8c:ec:ee:cc:ae:82:be:f5:87:da:13:5e:
    81:d8:71:46:48:d4:d0:5b:fa:0d:c0:b1:db:ff:ce:
    0b:93:bc:0e:48:31:c4:4a:28:4b:db:a8:7a:51:e8:
    fc:0a:89:44:fa:d6:a1:61:34:59:eb:d0:12:44:96:
    66:7b:26:4c:e0:2b:07:92:6f:69:5e:5d:e7:20:55:
    7e:72:86:08:57:06:3a:62:14:5f:d4:59:eb:f8:5c:
    15:17:b1:05:11:02:ee:86:de:fe:6a:35:bd:70:35:
    f0:ee:bc:9b:d1:d4:79:61
coefficient:
    43:61:58:68:0c:c8:fa:66:95:e1:86:ff:a8:97:7b:
    47:cd:82:de:07:3e:98:3c:2c:36:da:05:ca:50:c9:
    79:07:81:b7:89:29:50:78:f7:1f:a4:6d:fd:65:fa:
    cf:e7:24:38:83:cc:01:bb:86:e8:39:b0:76:92:20:
    54:0d:8c:3f:90:da:bb:ec:a8:0f:34:16:82:89:fe:
    ed:87:f7:26:32:79:5b:73:a8:99:db:a1:29:6e:cc:
    5b:db:f8:72:47:f1:3f:3a:f6:26:a6:60:49:89:8b:
    4e:c5:a2:65:e4:45:1b:a7:65:12:62:9a:47:0b:6e:
    52:57:03:df:e9:d8:3a:e3
[ajay@ajay certs]$ openssl x509 -in server.crt -text -noout
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 0 (0x0)
        Signature Algorithm: sha1WithRSAEncryption
        Issuer: CN=ajay.garg.com/emailAddress=ajay@xxxxxxxxxxxxxxxxxxx
        Validity
            Not Before: Mar 22 13:07:13 2012 GMT
            Not After : Mar 22 13:07:13 2013 GMT
        Subject: CN=ajay.garg.com/emailAddress=ajay@xxxxxxxxxxxxxxxxxxx

        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:b9:2d:f2:59:1f:f6:c2:ac:0d:bd:0f:dd:25:e5:
                    e8:7e:5b:1e:94:45:6d:be:2d:60:d6:8b:95:3a:11:
                    12:90:3a:4b:b7:ef:63:be:80:90:f7:8a:ce:1e:99:
                    46:11:72:23:be:f3:24:d1:5c:fe:40:ca:67:04:13:
                    59:10:02:4d:2b:ac:30:15:b5:a0:ff:1a:60:6d:28:
                    4a:42:dd:81:3b:26:9f:c7:d2:92:99:da:bc:c0:d3:
                    60:03:4c:e7:4d:c9:64:11:c6:63:e1:78:f2:b4:9a:
                    71:cd:56:a6:d5:a4:b1:c5:b4:d8:ee:5b:57:e7:80:
                    f5:75:92:af:8c:cd:ba:d6:b3:d2:fd:1b:27:1d:6b:
                    17:97:dc:ff:0c:31:8d:59:76:72:81:fb:51:85:02:
                    db:2e:9b:b4:59:85:e5:cd:32:67:3d:7b:20:02:43:
                    cb:e8:bd:c5:c7:b6:3e:15:f2:44:94:54:fb:fd:77:
                    e1:f1:f2:15:7a:6d:22:d9:f3:a9:e2:a8:a2:84:1c:
                    4b:cf:78:d4:6a:f2:a7:87:e2:01:d5:22:f6:e2:6c:
                    e0:e7:7f:b3:32:0b:c4:01:2d:fb:9d:db:fe:44:a9:
                    84:63:f0:eb:da:9d:5f:e4:73:2c:69:5d:d5:e1:80:
                    5e:7c:91:45:31:b3:ee:0e:0f:5c:50:bc:3a:97:8d:
                    dd:63
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                18:54:CD:F7:D7:68:97:01:7F:C8:A2:B7:39:F7:FF:AD:ED:D1:4A:27
            X509v3 Authority Key Identifier:
                keyid:18:54:CD:F7:D7:68:97:01:7F:C8:A2:B7:39:F7:FF:AD:ED:D1:4A:27

            X509v3 Basic Constraints:
                CA:TRUE
    Signature Algorithm: sha1WithRSAEncryption
        58:c2:69:d8:f9:df:8b:0c:59:9e:fd:7a:64:a8:fb:ca:95:81:
        6b:dd:59:c6:50:85:92:2d:74:ba:6a:37:bf:ba:a9:cd:6c:c9:
        37:e0:d1:66:34:57:68:dd:71:97:94:15:d9:5a:cf:14:ed:bf:
        9e:bf:b9:5e:3e:3e:c0:b3:e4:bf:aa:2a:31:6c:97:20:97:16:
        b8:50:c4:2f:d8:48:b9:0b:4a:f7:07:23:dd:d0:d5:82:b9:e7:
        2e:bf:79:57:26:bb:e8:29:7b:fd:ca:6c:95:42:bd:2f:69:47:
        a1:76:fe:3a:56:cc:6e:2d:85:9a:fe:14:ce:79:4d:76:d5:2f:
        a4:a8:c3:04:7e:bf:d6:02:30:9d:8c:fb:99:ef:ae:d1:fb:64:
        ff:f8:30:5b:44:e2:9e:56:75:19:85:7f:d2:e9:ea:2a:4e:9d:
        37:fe:8f:61:04:e8:7c:9d:98:c7:8a:9e:a0:d8:22:c2:f9:6c:
        a2:68:4d:8e:a3:0b:0d:a8:1a:78:83:4e:fc:7f:b3:06:8a:66:
        04:90:7a:b6:ee:d5:5c:44:45:29:69:3e:55:7c:40:df:5f:ab:
        a6:a1:28:88:8d:9c:57:70:e7:40:58:13:70:08:cc:3a:39:fd:
        3d:70:1e:9f:c3:d2:16:9f:5e:84:87:cb:a1:33:24:d1:b6:9e:
        16:78:02:47
########################################################################################################




c)
Ultimate test :: Actual usage of key and crt ===> I think it works (please verify by the following output :-) )

Server-Side Terminal ::
---------------------------------

########################################################################################################
[ajay@ajay certs]$ openssl s_server -accept 1212 -key server.key -cert server.crt -debug -msg
Enter pass phrase for server.key:
Using default temp DH parameters
ACCEPT
read from 0x9b8c570 [0x9b91b80] (11 bytes => 11 (0xB))
0000 - 16 03 01 00 6c 01 00 00-68 03 01                  ....l...h..
read from 0x9b8c570 [0x9b91b8e] (102 bytes => 102 (0x66))
0000 - 4f 6c af 7d 51 29 63 25-d3 50 27 41 c6 f3 47 48   Ol.}Q)c%.P'A..GH
0010 - c1 e0 4c 5f 57 99 dc 45-0e 6e 29 48 aa dc e6 44   ..L_W..E.n)H...D
0020 - 00 00 3a 00 39 00 38 00-88 00 87 00 35 00 84 00   ..:.9.8.....5...
0030 - 16 00 13 00 0a 00 33 00-32 00 9a 00 99 00 45 00   ......3.2.....E.
0040 - 44 00 2f 00 96 00 41 00-05 00 04 00 15 00 12 00   D./...A.........
0050 - 09 00 14 00 11 00 08 00-06 00 03 00 ff 02 01 00   ................
0060 - 00 04 00 23                                       ...#
0066 - <SPACES/NULS>
<<< TLS 1.0 Handshake [length 006c], ClientHello
    01 00 00 68 03 01 4f 6c af 7d 51 29 63 25 d3 50
    27 41 c6 f3 47 48 c1 e0 4c 5f 57 99 dc 45 0e 6e
    29 48 aa dc e6 44 00 00 3a 00 39 00 38 00 88 00
    87 00 35 00 84 00 16 00 13 00 0a 00 33 00 32 00
    9a 00 99 00 45 00 44 00 2f 00 96 00 41 00 05 00
    04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00
    03 00 ff 02 01 00 00 04 00 23 00 00
>>> TLS 1.0 Handshake [length 0035], ServerHello
    02 00 00 31 03 01 4f 6c af 7d e8 28 a3 0c 0e b9
    b0 a7 90 6b e1 41 3f 74 ba d2 28 24 99 22 f6 e9
    74 a1 bd 5e 71 dd 00 00 39 01 00 09 ff 01 00 01
    00 00 23 00 00
write to 0x9b8c570 [0x9b9b630] (58 bytes => 58 (0x3A))
0000 - 16 03 01 00 35 02 00 00-31 03 01 4f 6c af 7d e8   ....5...1..Ol.}.
0010 - 28 a3 0c 0e b9 b0 a7 90-6b e1 41 3f 74 ba d2 28   (.......k.A?t..(
0020 - 24 99 22 f6 e9 74 a1 bd-5e 71 dd 00 00 39 01 00   $."..t..^q...9..
0030 - 09 ff 01 00 01 00 00 23-                          .......#
003a - <SPACES/NULS>
>>> TLS 1.0 Handshake [length 035b], Certificate
    0b 00 03 57 00 03 54 00 03 51 30 82 03 4d 30 82
    02 35 a0 03 02 01 02 02 01 00 30 0d 06 09 2a 86
    48 86 f7 0d 01 01 05 05 00 30 41 31 16 30 14 06
    03 55 04 03 0c 0d 61 6a 61 79 2e 67 61 72 67 2e
    63 6f 6d 31 27 30 25 06 09 2a 86 48 86 f7 0d 01
    09 01 16 18 61 6a 61 79 40 61 63 74 69 76 69 74
    79 63 65 6e 74 72 61 6c 2e 63 6f 6d 30 1e 17 0d
    31 32 30 33 32 32 31 33 30 37 31 33 5a 17 0d 31
    33 30 33 32 32 31 33 30 37 31 33 5a 30 41 31 16
    30 14 06 03 55 04 03 0c 0d 61 6a 61 79 2e 67 61
    72 67 2e 63 6f 6d 31 27 30 25 06 09 2a 86 48 86
    f7 0d 01 09 01 16 18 61 6a 61 79 40 61 63 74 69
    76 69 74 79 63 65 6e 74 72 61 6c 2e 63 6f 6d 30
    82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01
    05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00
    b9 2d f2 59 1f f6 c2 ac 0d bd 0f dd 25 e5 e8 7e
    5b 1e 94 45 6d be 2d 60 d6 8b 95 3a 11 12 90 3a
    4b b7 ef 63 be 80 90 f7 8a ce 1e 99 46 11 72 23
    be f3 24 d1 5c fe 40 ca 67 04 13 59 10 02 4d 2b
    ac 30 15 b5 a0 ff 1a 60 6d 28 4a 42 dd 81 3b 26
    9f c7 d2 92 99 da bc c0 d3 60 03 4c e7 4d c9 64
    11 c6 63 e1 78 f2 b4 9a 71 cd 56 a6 d5 a4 b1 c5
    b4 d8 ee 5b 57 e7 80 f5 75 92 af 8c cd ba d6 b3
    d2 fd 1b 27 1d 6b 17 97 dc ff 0c 31 8d 59 76 72
    81 fb 51 85 02 db 2e 9b b4 59 85 e5 cd 32 67 3d
    7b 20 02 43 cb e8 bd c5 c7 b6 3e 15 f2 44 94 54
    fb fd 77 e1 f1 f2 15 7a 6d 22 d9 f3 a9 e2 a8 a2
    84 1c 4b cf 78 d4 6a f2 a7 87 e2 01 d5 22 f6 e2
    6c e0 e7 7f b3 32 0b c4 01 2d fb 9d db fe 44 a9
    84 63 f0 eb da 9d 5f e4 73 2c 69 5d d5 e1 80 5e
    7c 91 45 31 b3 ee 0e 0f 5c 50 bc 3a 97 8d dd 63
    02 03 01 00 01 a3 50 30 4e 30 1d 06 03 55 1d 0e
    04 16 04 14 18 54 cd f7 d7 68 97 01 7f c8 a2 b7
    39 f7 ff ad ed d1 4a 27 30 1f 06 03 55 1d 23 04
    18 30 16 80 14 18 54 cd f7 d7 68 97 01 7f c8 a2
    b7 39 f7 ff ad ed d1 4a 27 30 0c 06 03 55 1d 13
    04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7
    0d 01 01 05 05 00 03 82 01 01 00 58 c2 69 d8 f9
    df 8b 0c 59 9e fd 7a 64 a8 fb ca 95 81 6b dd 59
    c6 50 85 92 2d 74 ba 6a 37 bf ba a9 cd 6c c9 37
    e0 d1 66 34 57 68 dd 71 97 94 15 d9 5a cf 14 ed
    bf 9e bf b9 5e 3e 3e c0 b3 e4 bf aa 2a 31 6c 97
    20 97 16 b8 50 c4 2f d8 48 b9 0b 4a f7 07 23 dd
    d0 d5 82 b9 e7 2e bf 79 57 26 bb e8 29 7b fd ca
    6c 95 42 bd 2f 69 47 a1 76 fe 3a 56 cc 6e 2d 85
    9a fe 14 ce 79 4d 76 d5 2f a4 a8 c3 04 7e bf d6
    02 30 9d 8c fb 99 ef ae d1 fb 64 ff f8 30 5b 44
    e2 9e 56 75 19 85 7f d2 e9 ea 2a 4e 9d 37 fe 8f
    61 04 e8 7c 9d 98 c7 8a 9e a0 d8 22 c2 f9 6c a2
    68 4d 8e a3 0b 0d a8 1a 78 83 4e fc 7f b3 06 8a
    66 04 90 7a b6 ee d5 5c 44 45 29 69 3e 55 7c 40
    df 5f ab a6 a1 28 88 8d 9c 57 70 e7 40 58 13 70
    08 cc 3a 39 fd 3d 70 1e 9f c3 d2 16 9f 5e 84 87
    cb a1 33 24 d1 b6 9e 16 78 02 47
write to 0x9b8c570 [0x9b9b630] (864 bytes => 864 (0x360))
0000 - 16 03 01 03 5b 0b 00 03-57 00 03 54 00 03 51 30   ....[...W..T..Q0
0010 - 82 03 4d 30 82 02 35 a0-03 02 01 02 02 01 00 30   ..M0..5........0
0020 - 0d 06 09 2a 86 48 86 f7-0d 01 01 05 05 00 30 41   ...*.H........0A
0030 - 31 16 30 14 06 03 55 04-03 0c 0d 61 6a 61 79 2e   1.0...U....ajay.
0040 - 67 61 72 67 2e 63 6f 6d-31 27 30 25 06 09 2a 86   garg.com1'0%..*.
0050 - 48 86 f7 0d 01 09 01 16-18 61 6a 61 79 40 61 63   H........ajay@ac
0060 - 74 69 76 69 74 79 63 65-6e 74 72 61 6c 2e 63 6f   tivitycentral.co
0070 - 6d 30 1e 17 0d 31 32 30-33 32 32 31 33 30 37 31   m0...12032213071
0080 - 33 5a 17 0d 31 33 30 33-32 32 31 33 30 37 31 33   3Z..130322130713
0090 - 5a 30 41 31 16 30 14 06-03 55 04 03 0c 0d 61 6a   Z0A1.0...U....aj
00a0 - 61 79 2e 67 61 72 67 2e-63 6f 6d 31 27 30 25 06   ay.garg.com1'0%.
00b0 - 09 2a 86 48 86 f7 0d 01-09 01 16 18 61 6a 61 79   .*.H........ajay
00c0 - 40 61 63 74 69 76 69 74-79 63 65 6e 74 72 61 6c   @activitycentral
00d0 - 2e 63 6f 6d 30 82 01 22-30 0d 06 09 2a 86 48 86   .com0.."0...*.H.
00e0 - f7 0d 01 01 01 05 00 03-82 01 0f 00 30 82 01 0a   ............0...
00f0 - 02 82 01 01 00 b9 2d f2-59 1f f6 c2 ac 0d bd 0f   ......-.Y.......
0100 - dd 25 e5 e8 7e 5b 1e 94-45 6d be 2d 60 d6 8b 95   .%..~[..Em.-`...
0110 - 3a 11 12 90 3a 4b b7 ef-63 be 80 90 f7 8a ce 1e   :...:K..c.......
0120 - 99 46 11 72 23 be f3 24-d1 5c fe 40 ca 67 04 13   .F.r#..$.\.@.g..
0130 - 59 10 02 4d 2b ac 30 15-b5 a0 ff 1a 60 6d 28 4a   Y..M+.0.....`m(J
0140 - 42 dd 81 3b 26 9f c7 d2-92 99 da bc c0 d3 60 03   B..;&.........`.
0150 - 4c e7 4d c9 64 11 c6 63-e1 78 f2 b4 9a 71 cd 56   L.M.d..c.x...q.V
0160 - a6 d5 a4 b1 c5 b4 d8 ee-5b 57 e7 80 f5 75 92 af   ........[W...u..
0170 - 8c cd ba d6 b3 d2 fd 1b-27 1d 6b 17 97 dc ff 0c   ........'.k.....
0180 - 31 8d 59 76 72 81 fb 51-85 02 db 2e 9b b4 59 85   1.Yvr..Q......Y.
0190 - e5 cd 32 67 3d 7b 20 02-43 cb e8 bd c5 c7 b6 3e   ..2g={ .C......>
01a0 - 15 f2 44 94 54 fb fd 77-e1 f1 f2 15 7a 6d 22 d9   ..D.T..w....zm".
01b0 - f3 a9 e2 a8 a2 84 1c 4b-cf 78 d4 6a f2 a7 87 e2   .......K.x.j....
01c0 - 01 d5 22 f6 e2 6c e0 e7-7f b3 32 0b c4 01 2d fb   .."..l....2...-.
01d0 - 9d db fe 44 a9 84 63 f0-eb da 9d 5f e4 73 2c 69   ...D..c...._.s,i
01e0 - 5d d5 e1 80 5e 7c 91 45-31 b3 ee 0e 0f 5c 50 bc   ]...^|.E1....\P.
01f0 - 3a 97 8d dd 63 02 03 01-00 01 a3 50 30 4e 30 1d   :...c......P0N0.
0200 - 06 03 55 1d 0e 04 16 04-14 18 54 cd f7 d7 68 97   ..U.......T...h.
0210 - 01 7f c8 a2 b7 39 f7 ff-ad ed d1 4a 27 30 1f 06   .....9.....J'0..
0220 - 03 55 1d 23 04 18 30 16-80 14 18 54 cd f7 d7 68   .U.#..0....T...h
0230 - 97 01 7f c8 a2 b7 39 f7-ff ad ed d1 4a 27 30 0c   ......9.....J'0.
0240 - 06 03 55 1d 13 04 05 30-03 01 01 ff 30 0d 06 09   ..U....0....0...
0250 - 2a 86 48 86 f7 0d 01 01-05 05 00 03 82 01 01 00   *.H.............
0260 - 58 c2 69 d8 f9 df 8b 0c-59 9e fd 7a 64 a8 fb ca   X.i.....Y..zd...
0270 - 95 81 6b dd 59 c6 50 85-92 2d 74 ba 6a 37 bf ba   ..k.Y.P..-t.j7..
0280 - a9 cd 6c c9 37 e0 d1 66-34 57 68 dd 71 97 94 15   ..l.7..f4Wh.q...
0290 - d9 5a cf 14 ed bf 9e bf-b9 5e 3e 3e c0 b3 e4 bf   .Z.......^>>....
02a0 - aa 2a 31 6c 97 20 97 16-b8 50 c4 2f d8 48 b9 0b   .*1l. ...P./.H..
02b0 - 4a f7 07 23 dd d0 d5 82-b9 e7 2e bf 79 57 26 bb   J..#........yW&.
02c0 - e8 29 7b fd ca 6c 95 42-bd 2f 69 47 a1 76 fe 3a   .){..l.B./iG.v.:
02d0 - 56 cc 6e 2d 85 9a fe 14-ce 79 4d 76 d5 2f a4 a8   V.n-.....yMv./..
02e0 - c3 04 7e bf d6 02 30 9d-8c fb 99 ef ae d1 fb 64   ..~...0........d
02f0 - ff f8 30 5b 44 e2 9e 56-75 19 85 7f d2 e9 ea 2a   ..0[D..Vu......*
0300 - 4e 9d 37 fe 8f 61 04 e8-7c 9d 98 c7 8a 9e a0 d8   N.7..a..|.......
0310 - 22 c2 f9 6c a2 68 4d 8e-a3 0b 0d a8 1a 78 83 4e   "..l.hM......x.N
0320 - fc 7f b3 06 8a 66 04 90-7a b6 ee d5 5c 44 45 29   .....f..z...\DE)
0330 - 69 3e 55 7c 40 df 5f ab-a6 a1 28 88 8d 9c 57 70   i>U|@._...(...Wp
0340 - e7 40 58 13 70 08 cc 3a-39 fd 3d 70 1e 9f c3 d2   .@X.p..:9.=p....
0350 - 16 9f 5e 84 87 cb a1 33-24 d1 b6 9e 16 78 02 47   ..^....3$....x.G
>>> TLS 1.0 Handshake [length 018d], ServerKeyExchange
    0c 00 01 89 00 40 da 58 3c 16 d9 85 22 89 d0 e4
    af 75 6f 4c ca 92 dd 4b e5 33 b8 04 fb 0f ed 94
    ef 9c 8a 44 03 ed 57 46 50 d3 69 99 db 29 d7 76
    27 6b a2 d3 d4 12 e2 18 f4 dd 1e 08 4c f6 d8 00
    3e 7c 47 74 e8 33 00 01 02 00 40 29 8b a0 56 cc
    82 bf b8 cc 38 18 4b 52 50 84 e0 b3 b5 b7 46 b7
    60 55 e2 3a a2 75 ba 1a 02 87 59 3c 9f 3b 37 da
    73 17 69 7a 15 1d ad 15 63 49 08 8c 5e 2c 84 04
    4d fb 7c 4a cb 79 46 87 68 66 69 01 00 10 e2 0d
    49 97 09 cc 58 c6 45 e6 48 45 61 17 5c 49 d4 c5
    65 eb 38 b1 6c f6 ef 90 fe 45 4a 69 f6 8d 72 7e
    70 64 58 ac df b0 ca 37 df 70 d8 40 97 04 3c 53
    f2 c8 2f 18 85 06 eb 7d 3f 8a b4 21 c6 05 46 f1
    a0 81 a1 90 f5 c9 59 82 4c ee a9 03 45 ad c2 2d
    ef 94 71 3e 53 47 42 3e cf 51 74 d0 64 fa 99 35
    da 0c 0f 03 fb 75 82 81 21 67 c4 ea 18 b6 0c 9f
    c0 66 46 2a 3a 62 dd b5 10 d5 43 b7 8e 00 73 92
    67 04 28 2a 85 4d ce 0c 36 f0 4b 49 2e 28 c7 8a
    85 3b cb f6 42 77 dd 4a 19 82 0d 0a 22 bb f6 9e
    0c dd 18 f9 71 5e cf 4f aa b7 d9 50 7f 19 a6 f0
    35 81 dc e7 18 1a 01 52 45 0e 76 7a e6 55 ba ab
    87 2f a1 28 4d 5b 30 ee 48 0c cc 80 20 d0 b9 d7
    ee cd 78 7a 22 ee 0c 46 5d fb c6 87 9f 2a 29 5b
    64 15 f6 6b 76 bc 61 6d 30 58 89 79 50 85 9f ab
    c8 6d 0a f1 a5 fc 34 00 c8 82 2b f2 0d
write to 0x9b8c570 [0x9b9b630] (402 bytes => 402 (0x192))
0000 - 16 03 01 01 8d 0c 00 01-89 00 40 da 58 3c 16 d9   ..........@.X<..
0010 - 85 22 89 d0 e4 af 75 6f-4c ca 92 dd 4b e5 33 b8   ."....uoL...K.3.
0020 - 04 fb 0f ed 94 ef 9c 8a-44 03 ed 57 46 50 d3 69   ........D..WFP.i
0030 - 99 db 29 d7 76 27 6b a2-d3 d4 12 e2 18 f4 dd 1e   ..).v'k.........
0040 - 08 4c f6 d8 00 3e 7c 47-74 e8 33 00 01 02 00 40   .L...>|Gt.3....@
0050 - 29 8b a0 56 cc 82 bf b8-cc 38 18 4b 52 50 84 e0   )..V.....8.KRP..
0060 - b3 b5 b7 46 b7 60 55 e2-3a a2 75 ba 1a 02 87 59   ...F.`U.:.u....Y
0070 - 3c 9f 3b 37 da 73 17 69-7a 15 1d ad 15 63 49 08   <.;7.s.iz....cI.
0080 - 8c 5e 2c 84 04 4d fb 7c-4a cb 79 46 87 68 66 69   .^,..M.|J.yF.hfi
0090 - 01 00 10 e2 0d 49 97 09-cc 58 c6 45 e6 48 45 61   .....I...X.E.HEa
00a0 - 17 5c 49 d4 c5 65 eb 38-b1 6c f6 ef 90 fe 45 4a   .\I..e.8.l....EJ
00b0 - 69 f6 8d 72 7e 70 64 58-ac df b0 ca 37 df 70 d8   i..r~pdX....7.p.
00c0 - 40 97 04 3c 53 f2 c8 2f-18 85 06 eb 7d 3f 8a b4   @..<S../....}?..
00d0 - 21 c6 05 46 f1 a0 81 a1-90 f5 c9 59 82 4c ee a9   !..F.......Y.L..
00e0 - 03 45 ad c2 2d ef 94 71-3e 53 47 42 3e cf 51 74   .E..-..q>SGB>.Qt
00f0 - d0 64 fa 99 35 da 0c 0f-03 fb 75 82 81 21 67 c4   .d..5.....u..!g.
0100 - ea 18 b6 0c 9f c0 66 46-2a 3a 62 dd b5 10 d5 43   ......fF*:b....C
0110 - b7 8e 00 73 92 67 04 28-2a 85 4d ce 0c 36 f0 4b   ...s.g.(*.M..6.K
0120 - 49 2e 28 c7 8a 85 3b cb-f6 42 77 dd 4a 19 82 0d   I.(...;..Bw.J...
0130 - 0a 22 bb f6 9e 0c dd 18-f9 71 5e cf 4f aa b7 d9   .".......q^.O...
0140 - 50 7f 19 a6 f0 35 81 dc-e7 18 1a 01 52 45 0e 76   P....5......RE.v
0150 - 7a e6 55 ba ab 87 2f a1-28 4d 5b 30 ee 48 0c cc   z.U.../.(M[0.H..
0160 - 80 20 d0 b9 d7 ee cd 78-7a 22 ee 0c 46 5d fb c6   . .....xz"..F]..
0170 - 87 9f 2a 29 5b 64 15 f6-6b 76 bc 61 6d 30 58 89   ..*)[d..kv.am0X.
0180 - 79 50 85 9f ab c8 6d 0a-f1 a5 fc 34 00 c8 82 2b   yP....m....4...+
0190 - f2 0d                                             ..
>>> TLS 1.0 Handshake [length 0004], ServerHelloDone
    0e 00 00 00
write to 0x9b8c570 [0x9b9b630] (9 bytes => 9 (0x9))
0000 - 16 03 01 00 04 0e                                 ......
0009 - <SPACES/NULS>
read from 0x9b8c570 [0x9b91b83] (5 bytes => 5 (0x5))
0000 - 16 03 01 00 46                                    ....F
read from 0x9b8c570 [0x9b91b88] (70 bytes => 70 (0x46))
0000 - 10 00 00 42 00 40 32 dc-c4 10 cd 83 60 23 68 33   ...B.@2.....`#h3
0010 - c4 3a 99 88 f8 7c b7 49-23 10 bd dd ec 17 30 30   .:...|.I#.....00
0020 - 1d de a5 e8 8a 67 5a 9a-48 97 4d ed 66 8b d8 62   .....gZ.H.M.f..b
0030 - 33 22 cd 8d 47 98 05 33-6c 1c 2f 17 ee 49 ec 79   3"..G..3l./..I.y
0040 - 0e 17 e8 33 67 79                                 ...3gy
<<< TLS 1.0 Handshake [length 0046], ClientKeyExchange
    10 00 00 42 00 40 32 dc c4 10 cd 83 60 23 68 33
    c4 3a 99 88 f8 7c b7 49 23 10 bd dd ec 17 30 30
    1d de a5 e8 8a 67 5a 9a 48 97 4d ed 66 8b d8 62
    33 22 cd 8d 47 98 05 33 6c 1c 2f 17 ee 49 ec 79
    0e 17 e8 33 67 79
read from 0x9b8c570 [0x9b91b83] (5 bytes => 5 (0x5))
0000 - 14 03 01 00 01                                    .....
read from 0x9b8c570 [0x9b91b88] (1 bytes => 1 (0x1))
0000 - 01                                                .
<<< TLS 1.0 ChangeCipherSpec [length 0001]
    01
read from 0x9b8c570 [0x9b91b83] (5 bytes => 5 (0x5))
0000 - 16 03 01 00 30                                    ....0
read from 0x9b8c570 [0x9b91b88] (48 bytes => 48 (0x30))
0000 - 26 be dc de 4f cd a6 b2-5b 79 ca a7 32 0f fc a9   &...O...[y..2...
0010 - 01 dc 8e 9a 92 43 d8 4f-37 0b f4 4f ad 09 9c 04   .....C.O7..O....
0020 - 86 3a 30 f0 57 8d cd bc-6e 0f 7a 5e 24 bf 07 44   .:0.W...n.z^$..D
<<< TLS 1.0 Handshake [length 0010], Finished
    14 00 00 0c d5 f4 0a ad 37 c9 04 8e e7 75 55 da
>>> TLS 1.0 Handshake [length 00aa]???
    04 00 00 a6 00 00 00 00 00 a0 e9 98 c9 45 74 bb
    70 08 32 af 09 f9 a2 03 65 9d 11 61 e9 71 0a 9e
    07 ca 2c cf 1d 41 14 01 83 d9 b2 b9 87 ee f5 93
    fd f9 54 5a f1 83 6b 0a c5 61 79 aa 52 52 ae 05
    d3 b4 aa 9f 1a 1c 18 d2 a3 95 44 9c 80 a4 eb ce
    cf 3f 73 76 96 c5 d7 80 d7 b4 0c 33 9f 79 68 aa
    23 0c 9b df ad a4 3b d2 8a 03 d8 16 71 3a a9 e4
    14 9d 84 54 b3 85 57 da ae c4 a8 53 f9 88 3a e3
    3d e3 62 6e e4 02 da bf 92 32 74 41 66 26 0b 37
    01 98 ca d6 b1 05 5b c3 17 89 09 54 a2 7b 1c 02
    3f c0 c5 cb 27 2b 63 5a aa 8e
write to 0x9b8c570 [0x9b9b630] (175 bytes => 175 (0xAF))
0000 - 16 03 01 00 aa 04 00 00-a6 00 00 00 00 00 a0 e9   ................
0010 - 98 c9 45 74 bb 70 08 32-af 09 f9 a2 03 65 9d 11   ..Et.p.2.....e..
0020 - 61 e9 71 0a 9e 07 ca 2c-cf 1d 41 14 01 83 d9 b2   a.q....,..A.....
0030 - b9 87 ee f5 93 fd f9 54-5a f1 83 6b 0a c5 61 79   .......TZ..k..ay
0040 - aa 52 52 ae 05 d3 b4 aa-9f 1a 1c 18 d2 a3 95 44   .RR............D
0050 - 9c 80 a4 eb ce cf 3f 73-76 96 c5 d7 80 d7 b4 0c   ......?sv.......
0060 - 33 9f 79 68 aa 23 0c 9b-df ad a4 3b d2 8a 03 d8   3.yh.#.....;....
0070 - 16 71 3a a9 e4 14 9d 84-54 b3 85 57 da ae c4 a8   .q:.....T..W....
0080 - 53 f9 88 3a e3 3d e3 62-6e e4 02 da bf 92 32 74   S..:.=.bn.....2t
0090 - 41 66 26 0b 37 01 98 ca-d6 b1 05 5b c3 17 89 09   Af&.7......[....
00a0 - 54 a2 7b 1c 02 3f c0 c5-cb 27 2b 63 5a aa 8e      T.{..?...'+cZ..
>>> TLS 1.0 ChangeCipherSpec [length 0001]
    01
write to 0x9b8c570 [0x9b9b630] (6 bytes => 6 (0x6))
0000 - 14 03 01 00 01 01                                 ......
>>> TLS 1.0 Handshake [length 0010], Finished
    14 00 00 0c 12 df bc b7 2d d7 d2 cc f6 63 95 fc
write to 0x9b8c570 [0x9b9b630] (53 bytes => 53 (0x35))
0000 - 16 03 01 00 30 64 27 2d-1c 38 cf 26 5b 95 8d 92   ....0d'-.8.&[...
0010 - bd 6d 9c 9c 88 41 1f 92-32 83 4b bd 90 93 57 b1   .m...A..2.K...W.
0020 - 8c 24 07 8f 33 66 9c c7-7c 82 51 86 c0 26 a9 c5   .$..3f..|.Q..&..
0030 - 61 06 aa c7 01                                    a....
-----BEGIN SSL SESSION PARAMETERS-----
MFoCAQECAgMBBAIAOQQABDCvzNRnVOEwKsLdVmk6YklAjwjDskhIeUpHw5r/h4jx
UhL2jwk1Z2NxUgosU6jSMbGhBgIET2yvfaIEAgIBLKQGBAQBAAAAqwMEAQE=
-----END SSL SESSION PARAMETERS-----
Shared ciphers:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA:AES256-SHA:CAMELLIA256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:DHE-RSA-SEED-SHA:DHE-DSS-SEED-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-SHA:AES128-SHA:SEED-SHA:CAMELLIA128-SHA:RC4-SHA:RC4-MD5:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-RC4-MD5
CIPHER is DHE-RSA-AES256-SHA
Secure Renegotiation IS supported
##################################################################################################################



Client-Side Terminal
===============

##################################################################################################################
[ajay@ajay ~]$ openssl s_client -connect localhost:1212 -debug -msg
CONNECTED(00000003)
write to 0x841c2f8 [0x841caf8] (113 bytes => 113 (0x71))
0000 - 16 03 01 00 6c 01 00 00-68 03 01 4f 6c af 7d 51   ....l...h..Ol.}Q
0010 - 29 63 25 d3 50 27 41 c6-f3 47 48 c1 e0 4c 5f 57   )c%.P'A..GH..L_W
0020 - 99 dc 45 0e 6e 29 48 aa-dc e6 44 00 00 3a 00 39   ..E.n)H...D..:.9
0030 - 00 38 00 88 00 87 00 35-00 84 00 16 00 13 00 0a   .8.....5........
0040 - 00 33 00 32 00 9a 00 99-00 45 00 44 00 2f 00 96   .3.2.....E.D./..
0050 - 00 41 00 05 00 04 00 15-00 12 00 09 00 14 00 11   .A..............
0060 - 00 08 00 06 00 03 00 ff-02 01 00 00 04 00 23      ..............#
0071 - <SPACES/NULS>
>>> TLS 1.0 Handshake [length 006c], ClientHello
    01 00 00 68 03 01 4f 6c af 7d 51 29 63 25 d3 50
    27 41 c6 f3 47 48 c1 e0 4c 5f 57 99 dc 45 0e 6e
    29 48 aa dc e6 44 00 00 3a 00 39 00 38 00 88 00
    87 00 35 00 84 00 16 00 13 00 0a 00 33 00 32 00
    9a 00 99 00 45 00 44 00 2f 00 96 00 41 00 05 00
    04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00
    03 00 ff 02 01 00 00 04 00 23 00 00
read from 0x841c2f8 [0x8422058] (7 bytes => 7 (0x7))
0000 - 16 03 01 00 35 02                                 ....5.
0007 - <SPACES/NULS>
read from 0x841c2f8 [0x8422062] (51 bytes => 51 (0x33))
0000 - 00 31 03 01 4f 6c af 7d-e8 28 a3 0c 0e b9 b0 a7   .1..Ol.}.(......
0010 - 90 6b e1 41 3f 74 ba d2-28 24 99 22 f6 e9 74 a1   .k.A?t..($."..t.
0020 - bd 5e 71 dd 00 00 39 01-00 09 ff 01 00 01 00 00   .^q...9.........
0030 - 23                                                #
0033 - <SPACES/NULS>
<<< TLS 1.0 Handshake [length 0035], ServerHello
    02 00 00 31 03 01 4f 6c af 7d e8 28 a3 0c 0e b9
    b0 a7 90 6b e1 41 3f 74 ba d2 28 24 99 22 f6 e9
    74 a1 bd 5e 71 dd 00 00 39 01 00 09 ff 01 00 01
    00 00 23 00 00
read from 0x841c2f8 [0x842205b] (5 bytes => 5 (0x5))
0000 - 16 03 01 03 5b                                    ....[
read from 0x841c2f8 [0x8422060] (859 bytes => 859 (0x35B))
0000 - 0b 00 03 57 00 03 54 00-03 51 30 82 03 4d 30 82   ...W..T..Q0..M0.
0010 - 02 35 a0 03 02 01 02 02-01 00 30 0d 06 09 2a 86   .5........0...*.
0020 - 48 86 f7 0d 01 01 05 05-00 30 41 31 16 30 14 06   H........0A1.0..
0030 - 03 55 04 03 0c 0d 61 6a-61 79 2e 67 61 72 67 2e   .U....ajay.garg.
0040 - 63 6f 6d 31 27 30 25 06-09 2a 86 48 86 f7 0d 01   com1'0%..*.H....
0050 - 09 01 16 18 61 6a 61 79-40 61 63 74 69 76 69 74   ....ajay@activit
0060 - 79 63 65 6e 74 72 61 6c-2e 63 6f 6d 30 1e 17 0d   ycentral.com0...
0070 - 31 32 30 33 32 32 31 33-30 37 31 33 5a 17 0d 31   120322130713Z..1
0080 - 33 30 33 32 32 31 33 30-37 31 33 5a 30 41 31 16   30322130713Z0A1.
0090 - 30 14 06 03 55 04 03 0c-0d 61 6a 61 79 2e 67 61   0...U....ajay.ga
00a0 - 72 67 2e 63 6f 6d 31 27-30 25 06 09 2a 86 48 86   rg.com1'0%..*.H.
00b0 - f7 0d 01 09 01 16 18 61-6a 61 79 40 61 63 74 69   .......ajay@acti
00c0 - 76 69 74 79 63 65 6e 74-72 61 6c 2e 63 6f 6d 30   vitycentral.com0
00d0 - 82 01 22 30 0d 06 09 2a-86 48 86 f7 0d 01 01 01   .."0...*.H......
00e0 - 05 00 03 82 01 0f 00 30-82 01 0a 02 82 01 01 00   .......0........
00f0 - b9 2d f2 59 1f f6 c2 ac-0d bd 0f dd 25 e5 e8 7e   .-.Y........%..~
0100 - 5b 1e 94 45 6d be 2d 60-d6 8b 95 3a 11 12 90 3a   [..Em.-`...:...:
0110 - 4b b7 ef 63 be 80 90 f7-8a ce 1e 99 46 11 72 23   K..c........F.r#
0120 - be f3 24 d1 5c fe 40 ca-67 04 13 59 10 02 4d 2b   ..$.\.@.g..Y..M+
0130 - ac 30 15 b5 a0 ff 1a 60-6d 28 4a 42 dd 81 3b 26   .0.....`m(JB..;&
0140 - 9f c7 d2 92 99 da bc c0-d3 60 03 4c e7 4d c9 64   .........`.L.M.d
0150 - 11 c6 63 e1 78 f2 b4 9a-71 cd 56 a6 d5 a4 b1 c5   ..c.x...q.V.....
0160 - b4 d8 ee 5b 57 e7 80 f5-75 92 af 8c cd ba d6 b3   ...[W...u.......
0170 - d2 fd 1b 27 1d 6b 17 97-dc ff 0c 31 8d 59 76 72   ...'.k.....1.Yvr
0180 - 81 fb 51 85 02 db 2e 9b-b4 59 85 e5 cd 32 67 3d   ..Q......Y...2g=
0190 - 7b 20 02 43 cb e8 bd c5-c7 b6 3e 15 f2 44 94 54   { .C......>..D.T
01a0 - fb fd 77 e1 f1 f2 15 7a-6d 22 d9 f3 a9 e2 a8 a2   ..w....zm"......
01b0 - 84 1c 4b cf 78 d4 6a f2-a7 87 e2 01 d5 22 f6 e2   ..K.x.j......"..
01c0 - 6c e0 e7 7f b3 32 0b c4-01 2d fb 9d db fe 44 a9   l....2...-....D.
01d0 - 84 63 f0 eb da 9d 5f e4-73 2c 69 5d d5 e1 80 5e   .c...._.s,i]...^
01e0 - 7c 91 45 31 b3 ee 0e 0f-5c 50 bc 3a 97 8d dd 63   |.E1....\P.:...c
01f0 - 02 03 01 00 01 a3 50 30-4e 30 1d 06 03 55 1d 0e   ......P0N0...U..
0200 - 04 16 04 14 18 54 cd f7-d7 68 97 01 7f c8 a2 b7   .....T...h......
0210 - 39 f7 ff ad ed d1 4a 27-30 1f 06 03 55 1d 23 04   9.....J'0...U.#.
0220 - 18 30 16 80 14 18 54 cd-f7 d7 68 97 01 7f c8 a2   .0....T...h.....
0230 - b7 39 f7 ff ad ed d1 4a-27 30 0c 06 03 55 1d 13   .9.....J'0...U..
0240 - 04 05 30 03 01 01 ff 30-0d 06 09 2a 86 48 86 f7   ..0....0...*.H..
0250 - 0d 01 01 05 05 00 03 82-01 01 00 58 c2 69 d8 f9   ...........X.i..
0260 - df 8b 0c 59 9e fd 7a 64-a8 fb ca 95 81 6b dd 59   ...Y..zd.....k.Y
0270 - c6 50 85 92 2d 74 ba 6a-37 bf ba a9 cd 6c c9 37   .P..-t.j7....l.7
0280 - e0 d1 66 34 57 68 dd 71-97 94 15 d9 5a cf 14 ed   ..f4Wh.q....Z...
0290 - bf 9e bf b9 5e 3e 3e c0-b3 e4 bf aa 2a 31 6c 97   ....^>>.....*1l.
02a0 - 20 97 16 b8 50 c4 2f d8-48 b9 0b 4a f7 07 23 dd    ...P./.H..J..#.
02b0 - d0 d5 82 b9 e7 2e bf 79-57 26 bb e8 29 7b fd ca   .......yW&..){..
02c0 - 6c 95 42 bd 2f 69 47 a1-76 fe 3a 56 cc 6e 2d 85   l.B./iG.v.:V.n-.
02d0 - 9a fe 14 ce 79 4d 76 d5-2f a4 a8 c3 04 7e bf d6   ....yMv./....~..
02e0 - 02 30 9d 8c fb 99 ef ae-d1 fb 64 ff f8 30 5b 44   .0........d..0[D
02f0 - e2 9e 56 75 19 85 7f d2-e9 ea 2a 4e 9d 37 fe 8f   ..Vu......*N.7..
0300 - 61 04 e8 7c 9d 98 c7 8a-9e a0 d8 22 c2 f9 6c a2   a..|......."..l.
0310 - 68 4d 8e a3 0b 0d a8 1a-78 83 4e fc 7f b3 06 8a   hM......x.N.....
0320 - 66 04 90 7a b6 ee d5 5c-44 45 29 69 3e 55 7c 40   f..z...\DE)i>U|@
0330 - df 5f ab a6 a1 28 88 8d-9c 57 70 e7 40 58 13 70   ._...(...Wp.@X.p
0340 - 08 cc 3a 39 fd 3d 70 1e-9f c3 d2 16 9f 5e 84 87   ..:9.=p......^..
0350 - cb a1 33 24 d1 b6 9e 16-78 02 47                  ..3$....x.G
<<< TLS 1.0 Handshake [length 035b], Certificate
    0b 00 03 57 00 03 54 00 03 51 30 82 03 4d 30 82
    02 35 a0 03 02 01 02 02 01 00 30 0d 06 09 2a 86
    48 86 f7 0d 01 01 05 05 00 30 41 31 16 30 14 06
    03 55 04 03 0c 0d 61 6a 61 79 2e 67 61 72 67 2e
    63 6f 6d 31 27 30 25 06 09 2a 86 48 86 f7 0d 01
    09 01 16 18 61 6a 61 79 40 61 63 74 69 76 69 74
    79 63 65 6e 74 72 61 6c 2e 63 6f 6d 30 1e 17 0d
    31 32 30 33 32 32 31 33 30 37 31 33 5a 17 0d 31
    33 30 33 32 32 31 33 30 37 31 33 5a 30 41 31 16
    30 14 06 03 55 04 03 0c 0d 61 6a 61 79 2e 67 61
    72 67 2e 63 6f 6d 31 27 30 25 06 09 2a 86 48 86
    f7 0d 01 09 01 16 18 61 6a 61 79 40 61 63 74 69
    76 69 74 79 63 65 6e 74 72 61 6c 2e 63 6f 6d 30
    82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01
    05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00
    b9 2d f2 59 1f f6 c2 ac 0d bd 0f dd 25 e5 e8 7e
    5b 1e 94 45 6d be 2d 60 d6 8b 95 3a 11 12 90 3a
    4b b7 ef 63 be 80 90 f7 8a ce 1e 99 46 11 72 23
    be f3 24 d1 5c fe 40 ca 67 04 13 59 10 02 4d 2b
    ac 30 15 b5 a0 ff 1a 60 6d 28 4a 42 dd 81 3b 26
    9f c7 d2 92 99 da bc c0 d3 60 03 4c e7 4d c9 64
    11 c6 63 e1 78 f2 b4 9a 71 cd 56 a6 d5 a4 b1 c5
    b4 d8 ee 5b 57 e7 80 f5 75 92 af 8c cd ba d6 b3
    d2 fd 1b 27 1d 6b 17 97 dc ff 0c 31 8d 59 76 72
    81 fb 51 85 02 db 2e 9b b4 59 85 e5 cd 32 67 3d
    7b 20 02 43 cb e8 bd c5 c7 b6 3e 15 f2 44 94 54
    fb fd 77 e1 f1 f2 15 7a 6d 22 d9 f3 a9 e2 a8 a2
    84 1c 4b cf 78 d4 6a f2 a7 87 e2 01 d5 22 f6 e2
    6c e0 e7 7f b3 32 0b c4 01 2d fb 9d db fe 44 a9
    84 63 f0 eb da 9d 5f e4 73 2c 69 5d d5 e1 80 5e
    7c 91 45 31 b3 ee 0e 0f 5c 50 bc 3a 97 8d dd 63
    02 03 01 00 01 a3 50 30 4e 30 1d 06 03 55 1d 0e
    04 16 04 14 18 54 cd f7 d7 68 97 01 7f c8 a2 b7
    39 f7 ff ad ed d1 4a 27 30 1f 06 03 55 1d 23 04
    18 30 16 80 14 18 54 cd f7 d7 68 97 01 7f c8 a2
    b7 39 f7 ff ad ed d1 4a 27 30 0c 06 03 55 1d 13
    04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7
    0d 01 01 05 05 00 03 82 01 01 00 58 c2 69 d8 f9
    df 8b 0c 59 9e fd 7a 64 a8 fb ca 95 81 6b dd 59
    c6 50 85 92 2d 74 ba 6a 37 bf ba a9 cd 6c c9 37
    e0 d1 66 34 57 68 dd 71 97 94 15 d9 5a cf 14 ed
    bf 9e bf b9 5e 3e 3e c0 b3 e4 bf aa 2a 31 6c 97
    20 97 16 b8 50 c4 2f d8 48 b9 0b 4a f7 07 23 dd
    d0 d5 82 b9 e7 2e bf 79 57 26 bb e8 29 7b fd ca
    6c 95 42 bd 2f 69 47 a1 76 fe 3a 56 cc 6e 2d 85
    9a fe 14 ce 79 4d 76 d5 2f a4 a8 c3 04 7e bf d6
    02 30 9d 8c fb 99 ef ae d1 fb 64 ff f8 30 5b 44
    e2 9e 56 75 19 85 7f d2 e9 ea 2a 4e 9d 37 fe 8f
    61 04 e8 7c 9d 98 c7 8a 9e a0 d8 22 c2 f9 6c a2
    68 4d 8e a3 0b 0d a8 1a 78 83 4e fc 7f b3 06 8a
    66 04 90 7a b6 ee d5 5c 44 45 29 69 3e 55 7c 40
    df 5f ab a6 a1 28 88 8d 9c 57 70 e7 40 58 13 70
    08 cc 3a 39 fd 3d 70 1e 9f c3 d2 16 9f 5e 84 87
    cb a1 33 24 d1 b6 9e 16 78 02 47
depth=0 CN = ajay.garg.com, emailAddress = ajay@xxxxxxxxxxxxxxxxxxx
verify error:num=18:self signed certificate
verify return:1
depth=0 CN = ajay.garg.com, emailAddress = ajay@xxxxxxxxxxxxxxxxxxx
verify return:1
read from 0x841c2f8 [0x842205b] (5 bytes => 5 (0x5))
0000 - 16 03 01 01 8d                                    .....
read from 0x841c2f8 [0x8422060] (397 bytes => 397 (0x18D))
0000 - 0c 00 01 89 00 40 da 58-3c 16 d9 85 22 89 d0 e4   .....@.X<..."...
0010 - af 75 6f 4c ca 92 dd 4b-e5 33 b8 04 fb 0f ed 94   .uoL...K.3......
0020 - ef 9c 8a 44 03 ed 57 46-50 d3 69 99 db 29 d7 76   ...D..WFP.i..).v
0030 - 27 6b a2 d3 d4 12 e2 18-f4 dd 1e 08 4c f6 d8 00   'k..........L...
0040 - 3e 7c 47 74 e8 33 00 01-02 00 40 29 8b a0 56 cc   >|Gt.3....@)..V.
0050 - 82 bf b8 cc 38 18 4b 52-50 84 e0 b3 b5 b7 46 b7   ....8.KRP.....F.
0060 - 60 55 e2 3a a2 75 ba 1a-02 87 59 3c 9f 3b 37 da   `U.:.u....Y<.;7.
0070 - 73 17 69 7a 15 1d ad 15-63 49 08 8c 5e 2c 84 04   s.iz....cI..^,..
0080 - 4d fb 7c 4a cb 79 46 87-68 66 69 01 00 10 e2 0d   M.|J.yF.hfi.....
0090 - 49 97 09 cc 58 c6 45 e6-48 45 61 17 5c 49 d4 c5   I...X.E.HEa.\I..
00a0 - 65 eb 38 b1 6c f6 ef 90-fe 45 4a 69 f6 8d 72 7e   e.8.l....EJi..r~
00b0 - 70 64 58 ac df b0 ca 37-df 70 d8 40 97 04 3c 53   pdX....7.p.@..<S
00c0 - f2 c8 2f 18 85 06 eb 7d-3f 8a b4 21 c6 05 46 f1   ../....}?..!..F.
00d0 - a0 81 a1 90 f5 c9 59 82-4c ee a9 03 45 ad c2 2d   ......Y.L...E..-
00e0 - ef 94 71 3e 53 47 42 3e-cf 51 74 d0 64 fa 99 35   ..q>SGB>.Qt.d..5
00f0 - da 0c 0f 03 fb 75 82 81-21 67 c4 ea 18 b6 0c 9f   .....u..!g......
0100 - c0 66 46 2a 3a 62 dd b5-10 d5 43 b7 8e 00 73 92   .fF*:b....C...s.
0110 - 67 04 28 2a 85 4d ce 0c-36 f0 4b 49 2e 28 c7 8a   g.(*.M..6.KI.(..
0120 - 85 3b cb f6 42 77 dd 4a-19 82 0d 0a 22 bb f6 9e   .;..Bw.J...."...
0130 - 0c dd 18 f9 71 5e cf 4f-aa b7 d9 50 7f 19 a6 f0   ....q^.O...P....
0140 - 35 81 dc e7 18 1a 01 52-45 0e 76 7a e6 55 ba ab   5......RE.vz.U..
0150 - 87 2f a1 28 4d 5b 30 ee-48 0c cc 80 20 d0 b9 d7   ./.(M[0.H... ...
0160 - ee cd 78 7a 22 ee 0c 46-5d fb c6 87 9f 2a 29 5b   ..xz"..F]....*)[
0170 - 64 15 f6 6b 76 bc 61 6d-30 58 89 79 50 85 9f ab   d..kv.am0X.yP...
0180 - c8 6d 0a f1 a5 fc 34 00-c8 82 2b f2 0d            .m....4...+..
<<< TLS 1.0 Handshake [length 018d], ServerKeyExchange
    0c 00 01 89 00 40 da 58 3c 16 d9 85 22 89 d0 e4
    af 75 6f 4c ca 92 dd 4b e5 33 b8 04 fb 0f ed 94
    ef 9c 8a 44 03 ed 57 46 50 d3 69 99 db 29 d7 76
    27 6b a2 d3 d4 12 e2 18 f4 dd 1e 08 4c f6 d8 00
    3e 7c 47 74 e8 33 00 01 02 00 40 29 8b a0 56 cc
    82 bf b8 cc 38 18 4b 52 50 84 e0 b3 b5 b7 46 b7
    60 55 e2 3a a2 75 ba 1a 02 87 59 3c 9f 3b 37 da
    73 17 69 7a 15 1d ad 15 63 49 08 8c 5e 2c 84 04
    4d fb 7c 4a cb 79 46 87 68 66 69 01 00 10 e2 0d
    49 97 09 cc 58 c6 45 e6 48 45 61 17 5c 49 d4 c5
    65 eb 38 b1 6c f6 ef 90 fe 45 4a 69 f6 8d 72 7e
    70 64 58 ac df b0 ca 37 df 70 d8 40 97 04 3c 53
    f2 c8 2f 18 85 06 eb 7d 3f 8a b4 21 c6 05 46 f1
    a0 81 a1 90 f5 c9 59 82 4c ee a9 03 45 ad c2 2d
    ef 94 71 3e 53 47 42 3e cf 51 74 d0 64 fa 99 35
    da 0c 0f 03 fb 75 82 81 21 67 c4 ea 18 b6 0c 9f
    c0 66 46 2a 3a 62 dd b5 10 d5 43 b7 8e 00 73 92
    67 04 28 2a 85 4d ce 0c 36 f0 4b 49 2e 28 c7 8a
    85 3b cb f6 42 77 dd 4a 19 82 0d 0a 22 bb f6 9e
    0c dd 18 f9 71 5e cf 4f aa b7 d9 50 7f 19 a6 f0
    35 81 dc e7 18 1a 01 52 45 0e 76 7a e6 55 ba ab
    87 2f a1 28 4d 5b 30 ee 48 0c cc 80 20 d0 b9 d7
    ee cd 78 7a 22 ee 0c 46 5d fb c6 87 9f 2a 29 5b
    64 15 f6 6b 76 bc 61 6d 30 58 89 79 50 85 9f ab
    c8 6d 0a f1 a5 fc 34 00 c8 82 2b f2 0d
read from 0x841c2f8 [0x842205b] (5 bytes => 5 (0x5))
0000 - 16 03 01 00 04                                    .....
read from 0x841c2f8 [0x8422060] (4 bytes => 4 (0x4))
0000 - 0e                                                .
0004 - <SPACES/NULS>
<<< TLS 1.0 Handshake [length 0004], ServerHelloDone
    0e 00 00 00
>>> TLS 1.0 Handshake [length 0046], ClientKeyExchange
    10 00 00 42 00 40 32 dc c4 10 cd 83 60 23 68 33
    c4 3a 99 88 f8 7c b7 49 23 10 bd dd ec 17 30 30
    1d de a5 e8 8a 67 5a 9a 48 97 4d ed 66 8b d8 62
    33 22 cd 8d 47 98 05 33 6c 1c 2f 17 ee 49 ec 79
    0e 17 e8 33 67 79
write to 0x841c2f8 [0x842c960] (75 bytes => 75 (0x4B))
0000 - 16 03 01 00 46 10 00 00-42 00 40 32 dc c4 10 cd   ....F...B.@2....
0010 - 83 60 23 68 33 c4 3a 99-88 f8 7c b7 49 23 10 bd   .`#h3.:...|.I#..
0020 - dd ec 17 30 30 1d de a5-e8 8a 67 5a 9a 48 97 4d   ...00.....gZ.H.M
0030 - ed 66 8b d8 62 33 22 cd-8d 47 98 05 33 6c 1c 2f   .f..b3"..G..3l./
0040 - 17 ee 49 ec 79 0e 17 e8-33 67 79                  ..I.y...3gy
>>> TLS 1.0 ChangeCipherSpec [length 0001]
    01
write to 0x841c2f8 [0x842c960] (6 bytes => 6 (0x6))
0000 - 14 03 01 00 01 01                                 ......
>>> TLS 1.0 Handshake [length 0010], Finished
    14 00 00 0c d5 f4 0a ad 37 c9 04 8e e7 75 55 da
write to 0x841c2f8 [0x842c960] (53 bytes => 53 (0x35))
0000 - 16 03 01 00 30 26 be dc-de 4f cd a6 b2 5b 79 ca   ....0&...O...[y.
0010 - a7 32 0f fc a9 01 dc 8e-9a 92 43 d8 4f 37 0b f4   .2........C.O7..
0020 - 4f ad 09 9c 04 86 3a 30-f0 57 8d cd bc 6e 0f 7a   O.....:0.W...n.z
0030 - 5e 24 bf 07 44                                    ^$..D
read from 0x841c2f8 [0x842205b] (5 bytes => 5 (0x5))
0000 - 16 03 01 00 aa                                    .....
read from 0x841c2f8 [0x8422060] (170 bytes => 170 (0xAA))
0000 - 04 00 00 a6 00 00 00 00-00 a0 e9 98 c9 45 74 bb   .............Et.
0010 - 70 08 32 af 09 f9 a2 03-65 9d 11 61 e9 71 0a 9e   p.2.....e..a.q..
0020 - 07 ca 2c cf 1d 41 14 01-83 d9 b2 b9 87 ee f5 93   ..,..A..........
0030 - fd f9 54 5a f1 83 6b 0a-c5 61 79 aa 52 52 ae 05   ..TZ..k..ay.RR..
0040 - d3 b4 aa 9f 1a 1c 18 d2-a3 95 44 9c 80 a4 eb ce   ..........D.....
0050 - cf 3f 73 76 96 c5 d7 80-d7 b4 0c 33 9f 79 68 aa   .?sv.......3.yh.
0060 - 23 0c 9b df ad a4 3b d2-8a 03 d8 16 71 3a a9 e4   #.....;.....q:..
0070 - 14 9d 84 54 b3 85 57 da-ae c4 a8 53 f9 88 3a e3   ...T..W....S..:.
0080 - 3d e3 62 6e e4 02 da bf-92 32 74 41 66 26 0b 37   =.bn.....2tAf&.7
0090 - 01 98 ca d6 b1 05 5b c3-17 89 09 54 a2 7b 1c 02   ......[....T.{..
00a0 - 3f c0 c5 cb 27 2b 63 5a-aa 8e                     ?...'+cZ..
<<< TLS 1.0 Handshake [length 00aa]???
    04 00 00 a6 00 00 00 00 00 a0 e9 98 c9 45 74 bb
    70 08 32 af 09 f9 a2 03 65 9d 11 61 e9 71 0a 9e
    07 ca 2c cf 1d 41 14 01 83 d9 b2 b9 87 ee f5 93
    fd f9 54 5a f1 83 6b 0a c5 61 79 aa 52 52 ae 05
    d3 b4 aa 9f 1a 1c 18 d2 a3 95 44 9c 80 a4 eb ce
    cf 3f 73 76 96 c5 d7 80 d7 b4 0c 33 9f 79 68 aa
    23 0c 9b df ad a4 3b d2 8a 03 d8 16 71 3a a9 e4
    14 9d 84 54 b3 85 57 da ae c4 a8 53 f9 88 3a e3
    3d e3 62 6e e4 02 da bf 92 32 74 41 66 26 0b 37
    01 98 ca d6 b1 05 5b c3 17 89 09 54 a2 7b 1c 02
    3f c0 c5 cb 27 2b 63 5a aa 8e
read from 0x841c2f8 [0x842205b] (5 bytes => 5 (0x5))
0000 - 14 03 01 00 01                                    .....
read from 0x841c2f8 [0x8422060] (1 bytes => 1 (0x1))
0000 - 01                                                .
<<< TLS 1.0 ChangeCipherSpec [length 0001]
    01
read from 0x841c2f8 [0x842205b] (5 bytes => 5 (0x5))
0000 - 16 03 01 00 30                                    ....0
read from 0x841c2f8 [0x8422060] (48 bytes => 48 (0x30))
0000 - 64 27 2d 1c 38 cf 26 5b-95 8d 92 bd 6d 9c 9c 88   d'-.8.&[....m...
0010 - 41 1f 92 32 83 4b bd 90-93 57 b1 8c 24 07 8f 33   A..2.K...W..$..3
0020 - 66 9c c7 7c 82 51 86 c0-26 a9 c5 61 06 aa c7 01   f..|.Q..&..a....
<<< TLS 1.0 Handshake [length 0010], Finished
    14 00 00 0c 12 df bc b7 2d d7 d2 cc f6 63 95 fc
---
Certificate chain
 0 s:/CN=ajay.garg.com/emailAddress=ajay@xxxxxxxxxxxxxxxxxxx
   i:/CN=ajay.garg.com/emailAddress=ajay@xxxxxxxxxxxxxxxxxxx
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/CN=ajay.garg.com/emailAddress=ajay@xxxxxxxxxxxxxxxxxxx
issuer=/CN=ajay.garg.com/emailAddress=ajay@xxxxxxxxxxxxxxxxxxx
---
No client certificate CA names sent
---
SSL handshake has read 1567 bytes and written 247 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: zlib compression
Expansion: zlib compression
SSL-Session:
    Protocol  : TLSv1
    Cipher    : DHE-RSA-AES256-SHA
    Session-ID: 67806842A4BAC8803574F9999E7A39C75FB5E7D9722C8500AE1B01257F64EFE0
    Session-ID-ctx:
    Master-Key: AFCCD46754E1302AC2DD56693A6249408F08C3B24848794A47C39AFF8788F15212F68F0935676371520A2C53A8D231B1
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    TLS session ticket:
    0000 - e9 98 c9 45 74 bb 70 08-32 af 09 f9 a2 03 65 9d   ...Et.p.2.....e.
    0010 - 11 61 e9 71 0a 9e 07 ca-2c cf 1d 41 14 01 83 d9   .a.q....,..A....
    0020 - b2 b9 87 ee f5 93 fd f9-54 5a f1 83 6b 0a c5 61   ........TZ..k..a
    0030 - 79 aa 52 52 ae 05 d3 b4-aa 9f 1a 1c 18 d2 a3 95   y.RR............
    0040 - 44 9c 80 a4 eb ce cf 3f-73 76 96 c5 d7 80 d7 b4   D......?sv......
    0050 - 0c 33 9f 79 68 aa 23 0c-9b df ad a4 3b d2 8a 03   .3.yh.#.....;...
    0060 - d8 16 71 3a a9 e4 14 9d-84 54 b3 85 57 da ae c4   ..q:.....T..W...
    0070 - a8 53 f9 88 3a e3 3d e3-62 6e e4 02 da bf 92 32   .S..:.=.bn.....2
    0080 - 74 41 66 26 0b 37 01 98-ca d6 b1 05 5b c3 17 89   tAf&.7......[...
    0090 - 09 54 a2 7b 1c 02 3f c0-c5 cb 27 2b 63 5a aa 8e   .T.{..?...'+cZ..

    Compression: 1 (zlib compression)
    Start Time: 1332522877
    Timeout   : 300 (sec)
    Verify return code: 18 (self signed certificate)
---
##################################################################################################################




Marek, I think I will also have to say a word of sorry to you, for bothering you, as it seems everything is fine from openssl's point.
It seems there is some "black-magic" going on in "httpd" (which seems that there are some "hidden" certs are being picked up).
I sincerely hope, that there is someone from "httpd"'s side, who is responsible for answering on something that is owned by them.


Thanks, Sorry and Regards,
Ajay


On Fri, Mar 23, 2012 at 10:17 PM, <Marek.Marcola@xxxxxxxxx> wrote:
Hello,

Then do some more "deep" checking:

1) Check RSA key consistency

 $ openssl rsa -in key.pem -check -noout
 RSA key ok

2) Display RSA key and certificate

 $ openssl rsa -in key.pem -text -noout
Private-Key: (1024 bit)
modulus:
   00:e3:29:5a:7f:55:8c:3d:78:d3:be:5d:85:f7:47:
   76:80:87:8e:aa:11:54:98:78:5d:50:76:f5:7b:f9:
   7d:88:b4:20:c3:60:0e:5c:02:14:8b:6b:5c:58:9c:
   94:e1:a1:b6:1c:10:ca:66:4f:e9:3b:18:ce:49:7a:
   79:8b:e2:c3:80:96:a3:c7:5d:27:8c:93:24:e1:b0:
   84:22:37:6e:94:47:e5:06:a9:41:5e:23:53:0f:56:
   83:18:27:e8:8c:6f:9e:ba:53:71:ca:99:b4:5c:01:
   8f:f7:50:cf:8e:90:0e:32:2d:8a:03:c1:93:95:b9:
   0d:6a:b9:ed:5c:9f:1d:bc:b7
publicExponent: 65537 (0x10001)
privateExponent:
   25:88:f6:c0:25:95:97:ae:b8:66:33:33:e8:a9:31:
   46:89:9f:a4:30:5a:e7:1a:b4:68:90:4f:7d:dd:ba:
   c5:74:e6:19:02:6d:3c:fc:c7:02:46:8a:2a:c6:2c:
   bf:9f:a5:e4:bb:4d:86:5c:5b:f0:7c:e7:d1:32:60:
   95:21:b2:25:e4:7c:cc:92:78:64:aa:f8:f6:98:10:
   84:2d:57:e3:7a:e8:af:e2:ca:3a:37:7e:d9:00:d3:
   9f:10:06:f5:2c:b1:49:a2:64:05:d7:34:0e:1c:6f:
   11:6f:73:4e:67:7e:3b:91:56:5b:d6:3c:30:59:55:
   2b:e2:b9:d9:90:f4:53:01
....

$ openssl x509 -in crt.pem -text -noout
Certificate:
 ...
       Subject Public Key Info:
           Public Key Algorithm: rsaEncryption
               Public-Key: (1024 bit)
               Modulus:
                   00:e3:29:5a:7f:55:8c:3d:78:d3:be:5d:85:f7:47:
                   76:80:87:8e:aa:11:54:98:78:5d:50:76:f5:7b:f9:
                   7d:88:b4:20:c3:60:0e:5c:02:14:8b:6b:5c:58:9c:
                   94:e1:a1:b6:1c:10:ca:66:4f:e9:3b:18:ce:49:7a:
                   79:8b:e2:c3:80:96:a3:c7:5d:27:8c:93:24:e1:b0:
                   84:22:37:6e:94:47:e5:06:a9:41:5e:23:53:0f:56:
                   83:18:27:e8:8c:6f:9e:ba:53:71:ca:99:b4:5c:01:
                   8f:f7:50:cf:8e:90:0e:32:2d:8a:03:c1:93:95:b9:
                   0d:6a:b9:ed:5c:9f:1d:bc:b7
               Exponent: 65537 (0x10001)
....

and check that modulus==Modulus and publicExponent==Exponent

This should guarantee that key and cert are ok.

You may also test this files using simple openssl ssl server:

1) Run server on one terminal

 $ openssl s_server -accept 1212 -key key.pem -cert crt.pem -debug -msg

2) Connect to server from another terminal

 $ openssl s_client -connect localhost:1212 -debug -msg

Best regards,
--
Marek Marcola <Marek.Marcola@xxxxxxxxx>


owner-openssl-users@xxxxxxxxxxx wrote on 03/23/2012 04:44:42 PM:
> 03/23/2012 04:46 PM
>
> Please respond to
> openssl-users@xxxxxxxxxxx
>
> To
>
> openssl-users@xxxxxxxxxxx
>
> cc
>
> owner-openssl-users@xxxxxxxxxxx
>
> Subject
>
> Re: Query in "EVP_PKEY_cmp" for a particular value of ".crt" and ".key"
>
> Thanks Marek for the reply.
>
> I hope that it is ok if the key and cert files are with ".key" and
".crt" extensions
> (instead of pem).
>
>
> If yes, then fortunately (or unfortunately) the modulus matches.
>
>
#######################################################################################################
> [ajay@ajay certs]$ openssl rsa -in ssl.key -noout -modulus
>
Modulus=9ED17DA2E4C31CD5C1E24FE985C4DBC80A7A10FD1ADEBE828C4185AC3E36E188BC79E3A05C2C28E2CFE187DB5A765FFCB8BC70E74CBED24433F881830993267E6DC78C181233A135E09BB77B1404F550FED56EB5143DA7C005C13485D151DD35FC4F8E124DBCF675479BB89212C2CE184063A5B4278A6DE8D2204BB1D020FF2F
> [ajay@ajay certs]$ openssl x509 -in ssl.crt -noout -modulus
>
Modulus=9ED17DA2E4C31CD5C1E24FE985C4DBC80A7A10FD1ADEBE828C4185AC3E36E188BC79E3A05C2C28E2CFE187DB5A765FFCB8BC70E74CBED24433F881830993267E6DC78C181233A135E09BB77B1404F550FED56EB5143DA7C005C13485D151DD35FC4F8E124DBCF675479BB89212C2CE184063A5B4278A6DE8D2204BB1D020FF2F
>
#######################################################################################################
>
>

>
>
> So, Marek ::
>
> a)
> Could there be any other reason, wh
ere a return value of "0" may be returned?
>
> b)
> The permissions for "server.key" and "server.crt" are 0755. I hope,
these are valid permissions.
>
> c)
> Finally, I would
 appreciate if you could send me a pair of "key" and "crt" files,
> generated from your end (or alternatively, send me the command to
generate these files),
> THAT WOULD GUARANTEE THAT "EVP_PKEY_cmp(xk, k)" RETURNS 1 (as the
success value).
>
>
> Thanks again.
>
> Regards,
> Ajay
> On Fri, Mar 23, 2012 at 8:40 PM, <Marek.Marcola@xxxxxxxxx> wrote:>
Hello,
>
> owner-openssl-users@xxxxxxxxxxx wrote on 03/23/2012 03:10:47 PM:
>
> > Ajay Garg <ajaygargnsit@xxxxxxxxx>
> > Sent by: owner-openssl-users@xxxxxxxxxxx
> >
> ....> > Hi all.
> >
> >
 I have been trying lately to debug a startup issue in APACHE's httpd
> service; and the
> > last logs I receive in "/etc/httpd/logs_error_log" is
> >
> >
>
#####################################################################################################################
> > [error] SSL Library Error: 185073780 error:0B080074:x509 certificate
> > routines:X509_check_private_key:key values mismatch
> >
>
#####################################################################################################################
> Just do:
>  $ openssl rsa -in key.pem -noout -modulus
>  Modulus=E43E2DAB15DA7E70FC2E2149FC00481816650E799AAEC...
>  $ openssl x509 -in crt.pem -noout -modulus
>  Modulus=E43E2DAB15DA7E70FC2E2149FC00481816650E799AAEC...
> and check if output maches.
>
> Best regards,
> --
> Marek Marcola <Marek.Marcola@xxxxxxxxx>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@xxxxxxxxxxx
> Automated List Manager                           majordomo@xxxxxxxxxxx
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@xxxxxxxxxxx
Automated List Manager                           majordomo@xxxxxxxxxxx

=================== MESSAGE TO openssl ENDS HERE ====================================================















On Fri, Mar 23, 2012 at 7:44 PM, Ajay Garg <ajaygargnsit@xxxxxxxxx> wrote:
Posted a query to openssl mailing list as well.


=========================== MESSAGE TO openssl BEGINS HERE  ======================================
Hi all.

I have been trying lately to debug a startup issue in APACHE's httpd service; and the last logs I receive in "/etc/httpd/logs_error_log" is

##############################
#######################################################################################

[error] SSL Library Error: 185073780 error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch
#####################################################################################################################






As part of some desperate attempts, I downloaded source-rpms of "httpd" and "openssl", and tracked down the source from where error-emanates.
Following is the code-snippet from "crypto/x509/x509_cmp.c"

######################################################################################################################
int X509_check_private_key(X509 *x, EVP_PKEY *k)
    {
    EVP_PKEY *xk;
    int ret;

    xk=X509_get_pubkey(x);

    if (xk)
        ret = EVP_PKEY_cmp(xk, k);
    else
        ret = -2;

    switch (ret)
        {
    case 1:
        break;
    case 0:
        X509err(X509_F_X509_CHECK_PRIVATE_KEY,X509_R_KEY_VALUES_MISMATCH);
        break;
    case -1:
        X509err(X509_F_X509_CHECK_PRIVATE_KEY,X509_R_KEY_TYPE_MISMATCH);
        break;
    case -2:
            X509err(X509_F_X509_CHECK_PRIVATE_KEY,X509_R_UNKNOWN_KEY_TYPE);
        }
    if (xk)
        EVP_PKEY_free(xk);
    if (ret > 0)
        return 1;
    return 0;
    }
######################################################################################################################

After the call to " ret = EVP_PKEY_cmp(xk, k);", 0 is being returned as return value.

So, my query is ::

_What do the parameters "X509 *x, EVP_PKEY *k" correspond to_ ?


My guess is that "x" corresponds to a ".crt" file, while "k" corresponds to a "key" file.
The values at my side are ::



ssl.crt
---------


#######################################################################################################################
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
#######################################################################################################################





ssl.key
----------

########################################################################################################################
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
########################################################################################################################


So, is a return value of "0" expected for these?



Looking forward to a reply.


Thanks and Regards,
Ajay

=========================== MESSAGE TO openssl ENDS HERE ========================================



Regards,
Ajay



On Thu, Mar 22, 2012 at 7:40 PM, Ajay Garg <ajaygargnsit@xxxxxxxxx> wrote:
Thanks Mathijs for the reply.

1)
It's ok, I am just in the test-up phase; I have already generated new keys and certificates more than a dozen times :)





2)
Thanks for the help.
I used this command, and generated a new pair of keys and certificates (without a passphrase).
As expected, I wasn't asked for any passphrase now, when starting "httpd"; however, the service showed "FAILED" at startup, and I got the same logs in "/etc/httpd/logs/error_log" as follows ::

################################################################################################################
[Thu Mar 22 19:31:16 2012] [notice] SELinux policy enabled; httpd running as context unconfined_u:system_r:httpd_t:s0
[Thu Mar 22 19:31:16 2012] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu Mar 22 19:31:16 2012] [notice] SSL FIPS mode disabled
[Thu Mar 22 19:31:17 2012] [warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)
[Thu Mar 22 19:31:17 2012] [error] Unable to configure RSA server private key
[Thu Mar 22 19:31:17 2012] [error] SSL Library Error: 185073780 error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch
################################################################################################################



For brevity, here is the startup script output too ::


################################################################################################################
[ajay@ajay certs]$ sudo service httpd start
Starting httpd: [Thu Mar 22 19:31:16 2012] [warn] module ssl_module is already loaded, skipping
                                                           [FAILED]
################################################################################################################






3) Mathijs, I think this is a step too far to consider at this point, as the service hasn't started as yet.
    Anyways, I have already made the following values are the same across all ::

    (i)    "ServerName" in "/etc/httpd/conf/httpd.conf"
    (ii)   "CN" in the certificate


And sorry for kinda spamming the mailing list; but I had thought this might turn out to be first-time-newbie question.
My heartlful apologies .. :(

Finally, thanks for the irc link :)



Sorry, Thanks and Regards,
Ajay




On Thu, Mar 22, 2012 at 6:31 PM, Mathijs <mathijssch@xxxxxxxxx> wrote:
Hi and welcome to Apache,

Some notes about your questions:

1) You probably shouldn't post private keys to public mailing lists

2) Try generating the self-signed key and certificate pair with this command: 
openssl req -new -newkey rsa:1024 -days 365 -nodes -x509 -keyout ssl.key -out ssl.crt
(No need for a passphrase either.)

3) The CN or Common Name in a SSL certificate should always match the Host header in the http request. You are setting the Common Name to 127.0.0.1 and accessing the server with 'localhost', which causes a mismatch.

And finally, if you need urgent help, its often a better idea to join the apache httpd channel on irc (#httpd on irc.freenode.net) instead of repeatedly posting to the mailinglist.

On Thu, Mar 22, 2012 at 1:45 PM, Ajay Garg <ajaygargnsit@xxxxxxxxx> wrote:
Ping .. :-)

(On a serious note, I really need some help).

Thanks and Regards,
Ajay


On Thu, Mar 22, 2012 at 10:14 AM, Ajay Garg <ajaygargnsit@xxxxxxxxx> wrote:
I came across talks wherein it was mentioned that there could be mismatches in the "modulus" and "public exponent" of "server.key" and "server.crt". I have done the tests (using "openssl" command), but both - "modulus" and "public exponent" appear to be the same.

For brevity, I am posting the contents ::

server.key ::

####################################################################################################################
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-128-CBC,06A5864C289A29E8133ECDC689F27D91
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-----END RSA PRIVATE KEY-----
####################################################################################################################




server.crt ::

####################################################################################################################
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
####################################################################################################################



Regards,
Ajay


On Wed, Mar 21, 2012 at 6:55 PM, Ajay Garg <ajaygargnsit@xxxxxxxxx> wrote:
Well, I looked into "/etc/httpd/logs/error_log", and found that were some errors related to server-name not matching (don't remember the exact statement). But even then the service startup showed "OK", which apparently is a misnomer.

Anyways, I regenerated "server.key" and "server.crt" by ::

##################################################################################################################
[ajay@ajay ~]$ cd /etc/ssl/certs/
[ajay@ajay certs]$ ls
localhost.crt  make-dummy-cert  Makefile  server.crt  server.key
[ajay@ajay certs]$ pwd
/etc/ssl/certs
[ajay@ajay certs]$ sudo rm server.key
[ajay@ajay certs]$ sudo rm server.crt
[ajay@ajay certs]$ sudo make server.key
umask 77 ; \
/usr/bin/openssl genrsa -aes128 2048 > server.key
Generating RSA private key, 2048 bit long modulus
...........................................................................................+++
.........................................+++
e is 65537 (0x10001)
Enter pass phrase:
Verifying - Enter pass phrase:
[ajay@ajay certs]$ sudo make server.crt
umask 77 ; \
/usr/bin/openssl req -utf8 -new -key server.key -x509 -days 365 -out server.crt -set_serial 0
Enter pass phrase for server.key:
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [XX]:IN
State or Province Name (full name) []:Delhi
Locality Name (eg, city) [Default City]:Delhi
Organization Name (eg, company) [Default Company Ltd]:Delhi
Organizational Unit Name (eg, section) []:Delhi
Common Name (eg, your name or your server's hostname) []:127.0.0.1
Email Address []:ajaygargnsit@xxxxxxxxx
##################################################################################################################






I then tried to start "httpd" ::

##################################################################################################################
[ajay@ajay certs]$ sudo service httpd start
Starting httpd: [Wed Mar 21 18:52:00 2012] [warn] module ssl_module is already loaded, skipping

Apache/2.2.17 mod_ssl/2.2.17 (Pass Phrase Dialog)
Some of your private key files are encrypted for security reasons.
In order to read them you have to provide the pass phrases.

Server 127.0.0.1:443 (RSA)

Enter pass phrase:

OK: Pass Phrase Dialog successful.
                                                           [FAILED]
##################################################################################################################








and "/etc/httpd/logs/error_log" showed ::

##################################################################################################################
[Wed Mar 21 18:52:00 2012] [notice] SELinux policy enabled; httpd running as context unconfined_u:system_r:httpd_t:s0
[Wed Mar 21 18:52:00 2012] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Wed Mar 21 18:52:00 2012] [notice] SSL FIPS mode disabled
[Wed Mar 21 18:52:02 2012] [warn] RSA server certificate is a CA certificate (BasicConstraints: CA == TRUE !?)
[Wed Mar 21 18:52:02 2012] [error] Unable to configure RSA server private key
[Wed Mar 21 18:52:02 2012] [error] SSL Library Error: 185073780 error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch
##################################################################################################################



Ideas.. ??


Thanks and Regards,
Ajay




On Wed, Mar 21, 2012 at 5:37 PM, Ajay Garg <ajaygargnsit@xxxxxxxxx> wrote:
Hi all.

I am afraid I am a newbie to Apache; and have been trying to setup a HTTPS based WebDAV server using Apache2 on Fedora 14.

Prior to this, I could get the HTTP based WebDAV server working, and accessing the shares via gnome-nautilus worked like a charm :-)
Thus, I will present whatever I have tried to setup the HTTPS variant.


1.
Following are the contents of "/etc/httpd/conf/httpd.conf"

##############################
###############################################################################################
#
# This is the main Apache server configuration file.  It contains the
# configuration directives that give the server its instructions.
# See <URL:http://httpd.apache.org/docs/2.2/> for detailed information.
# In particular, see
# <URL:http://httpd.apache.org/docs/2.2/mod/directives.html>
# for a discussion of each configuration directive.
#
#
# Do NOT simply read the instructions in here without understanding
# what they do.  They're here only as hints or reminders.  If you are unsure
# consult the online docs. You have been warned. 
#
# The configuration directives are grouped into three basic sections:
#  1. Directives that control the operation of the Apache server process as a
#     whole (the 'global environment').
#  2. Directives that define the parameters of the 'main' or 'default' server,
#     which responds to requests that aren't handled by a virtual host.
#     These directives also provide default values for the settings
#     of all virtual hosts.
#  3. Settings for virtual hosts, which allow Web requests to be sent to
#     different IP addresses or hostnames and have them handled by the
#     same Apache server process.
#
# Configuration and logfile names: If the filenames you specify for many
# of the server's control files begin with "/" (or "drive:/" for Win32), the
# server will use that explicit path.  If the filenames do *not* begin
# with "/", the value of ServerRoot is prepended -- so "logs/foo.log"
# with ServerRoot set to "/etc/httpd" will be interpreted by the
# server as "/etc/httpd/logs/foo.log".
#

### Section 1: Global Environment
#
# The directives in this section affect the overall operation of Apache,
# such as the number of concurrent requests it can handle or where it
# can find its configuration files.
#

#
# Don't give away too much information about all the subcomponents
# we are running.  Comment out this line if you don't mind remote sites
# finding out what major optional modules you are running
ServerTokens OS

#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# NOTE!  If you intend to place this on an NFS (or otherwise network)
# mounted filesystem then please read the LockFile documentation
# (available at <URL:http://httpd.apache.org/docs/2.2/mod/mpm_common.html#lockfile>);
# you will save yourself a lot of trouble.
#
# Do NOT add a slash at the end of the directory path.
#
ServerRoot "/etc/httpd"

#
# PidFile: The file in which the server should record its process
# identification number when it starts.  Note the PIDFILE variable in
# /etc/sysconfig/httpd must be set appropriately if this location is
# changed.
#
PidFile run/httpd.pid

#
# Timeout: The number of seconds before receives and sends time out.
#
Timeout 60

#
# KeepAlive: Whether or not to allow persistent connections (more than
# one request per connection). Set to "Off" to deactivate.
#
KeepAlive Off

#
# MaxKeepAliveRequests: The maximum number of requests to allow
# during a persistent connection. Set to 0 to allow an unlimited amount.
# We recommend you leave this number high, for maximum performance.
#
MaxKeepAliveRequests 100

#
# KeepAliveTimeout: Number of seconds to wait for the next request from the
# same client on the same connection.
#
KeepAliveTimeout 5

##
## Server-Pool Size Regulation (MPM specific)
##

# prefork MPM
# StartServers: number of server processes to start
# MinSpareServers: minimum number of server processes which are kept spare
# MaxSpareServers: maximum number of server processes which are kept spare
# ServerLimit: maximum value for MaxClients for the lifetime of the server
# MaxClients: maximum number of server processes allowed to start
# MaxRequestsPerChild: maximum number of requests a server process serves
<IfModule prefork.c>
StartServers       8
MinSpareServers    5
MaxSpareServers   20
ServerLimit      256
MaxClients       256
MaxRequestsPerChild  4000
</IfModule>

# worker MPM
# StartServers: initial number of server processes to start
# MaxClients: maximum number of simultaneous client connections
# MinSpareThreads: minimum number of worker threads which are kept spare
# MaxSpareThreads: maximum number of worker threads which are kept spare
# ThreadsPerChild: constant number of worker threads in each server process
# MaxRequestsPerChild: maximum number of requests a server process serves
<IfModule worker.c>
StartServers         4
MaxClients         300
MinSpareThreads     25
MaxSpareThreads     75
ThreadsPerChild     25
MaxRequestsPerChild  0
</IfModule>

#
# Listen: Allows you to bind Apache to specific IP addresses and/or
# ports, in addition to the default. See also the <VirtualHost>
# directive.
#
# Change this to Listen on specific IP addresses as shown below to
# prevent Apache from glomming onto all bound IP addresses (0.0.0.0)
#
#Listen 12.34.56.78:80
Listen 80

#
# Dynamic Shared Object (DSO) Support
#
# To be able to use the functionality of a module which was built as a DSO you
# have to place corresponding `LoadModule' lines at this location so the
# directives contained in it are actually available _before_ they are used.
# Statically compiled modules (those listed by `httpd -l') do not need
# to be loaded here.
#
# Example:
# LoadModule foo_module modules/mod_foo.so
#
LoadModule auth_basic_module modules/mod_auth_basic.so
LoadModule auth_digest_module modules/mod_auth_digest.so
LoadModule authn_file_module modules/mod_authn_file.so
LoadModule authn_alias_module modules/mod_authn_alias.so
LoadModule authn_anon_module modules/mod_authn_anon.so
LoadModule authn_dbm_module modules/mod_authn_dbm.so
LoadModule authn_default_module modules/mod_authn_default.so
LoadModule authz_host_module modules/mod_authz_host.so
LoadModule authz_user_module modules/mod_authz_user.so
LoadModule authz_owner_module modules/mod_authz_owner.so
LoadModule authz_groupfile_module modules/mod_authz_groupfile.so
LoadModule authz_dbm_module modules/mod_authz_dbm.so
LoadModule authz_default_module modules/mod_authz_default.so
LoadModule ldap_module modules/mod_ldap.so
LoadModule authnz_ldap_module modules/mod_authnz_ldap.so
LoadModule include_module modules/mod_include.so
LoadModule log_config_module modules/mod_log_config.so
LoadModule logio_module modules/mod_logio.so
LoadModule env_module modules/mod_env.so
LoadModule ext_filter_module modules/mod_ext_filter.so
LoadModule mime_magic_module modules/mod_mime_magic.so
LoadModule expires_module modules/mod_expires.so
LoadModule deflate_module modules/mod_deflate.so
LoadModule headers_module modules/mod_headers.so
LoadModule usertrack_module modules/mod_usertrack.so
LoadModule setenvif_module modules/mod_setenvif.so
LoadModule mime_module modules/mod_mime.so
LoadModule dav_module modules/mod_dav.so
LoadModule status_module modules/mod_status.so
LoadModule autoindex_module modules/mod_autoindex.so
LoadModule info_module modules/mod_info.so
LoadModule dav_fs_module modules/mod_dav_fs.so
LoadModule vhost_alias_module modules/mod_vhost_alias.so
LoadModule negotiation_module modules/mod_negotiation.so
LoadModule dir_module modules/mod_dir.so
LoadModule actions_module modules/mod_actions.so
LoadModule speling_module modules/mod_speling.so
LoadModule userdir_module modules/mod_userdir.so
LoadModule alias_module modules/mod_alias.so
LoadModule substitute_module modules/mod_substitute.so
LoadModule rewrite_module modules/mod_rewrite.so
LoadModule proxy_module modules/mod_proxy.so
LoadModule proxy_balancer_module modules/mod_proxy_balancer.so
LoadModule proxy_ftp_module modules/mod_proxy_ftp.so
LoadModule proxy_http_module modules/mod_proxy_http.so
LoadModule proxy_ajp_module modules/mod_proxy_ajp.so
LoadModule proxy_connect_module modules/mod_proxy_connect.so
LoadModule cache_module modules/mod_cache.so
LoadModule suexec_module modules/mod_suexec.so
LoadModule disk_cache_module modules/mod_disk_cache.so
LoadModule cgi_module modules/mod_cgi.so
LoadModule version_module modules/mod_version.so
LoadModule ssl_module modules/mod_ssl.so

#
# The following modules are not loaded by default:
#
#LoadModule asis_module modules/mod_asis.so
#LoadModule authn_dbd_module modules/mod_authn_dbd.so
#LoadModule cern_meta_module modules/mod_cern_meta.so
#LoadModule cgid_module modules/mod_cgid.so
#LoadModule dbd_module modules/mod_dbd.so
#LoadModule dumpio_module modules/mod_dumpio.so
#LoadModule filter_module modules/mod_filter.so
#LoadModule ident_module modules/mod_ident.so
#LoadModule log_forensic_module modules/mod_log_forensic.so
#LoadModule unique_id_module modules/mod_unique_id.so
#

#
# Load config files from the config directory "/etc/httpd/conf.d".
#
Include conf.d/*.conf

#
# ExtendedStatus controls whether Apache will generate "full" status
# information (ExtendedStatus On) or just basic information (ExtendedStatus
# Off) when the "server-status" handler is called. The default is Off.
#
#ExtendedStatus On

#
# If you wish httpd to run as a different user or group, you must run
# httpd as root initially and it will switch. 
#
# User/Group: The name (or #number) of the user/group to run httpd as.
#  . On SCO (ODT 3) use "User nouser" and "Group nogroup".
#  . On HPUX you may not be able to use shared memory as nobody, and the
#    suggested workaround is to create a user www and use that user.
#  NOTE that some kernels refuse to setgid(Group) or semctl(IPC_SET)
#  when the value of (unsigned)Group is above 60000;
#  don't use Group #-1 on these systems!
#
User apache
Group apache

### Section 2: 'Main' server configuration
#
# The directives in this section set up the values used by the 'main'
# server, which responds to any requests that aren't handled by a
# <VirtualHost> definition.  These values also provide defaults for
# any <VirtualHost> containers you may define later in the file.
#
# All of these directives may appear inside <VirtualHost> containers,
# in which case these default settings will be overridden for the
# virtual host being defined.
#

#
# ServerAdmin: Your address, where problems with the server should be
# e-mailed.  This address appears on some server-generated pages, such
# as error documents.  e.g. admin@xxxxxxxxxxxxxxx
#
ServerAdmin root@localhost

#
# ServerName gives the name and port that the server uses to identify itself.
# This can often be determined automatically, but we recommend you specify
# it explicitly to prevent problems during startup.
#
# If this is not set to valid DNS name for your host, server-generated
# redirections will not work.  See also the UseCanonicalName directive.
#
# If your host doesn't have a registered DNS name, enter its IP address here.
# You will have to access it by its address anyway, and this will make
# redirections work in a sensible way.
#
#ServerName www.example.com:80

#
# UseCanonicalName: Determines how Apache constructs self-referencing
# URLs and the SERVER_NAME and SERVER_PORT variables.
# When set "Off", Apache will use the Hostname and Port supplied
# by the client.  When set "On", Apache will use the value of the
# ServerName directive.
#
UseCanonicalName Off

#
# DocumentRoot: The directory out of which you will serve your
# documents. By default, all requests are taken from this directory, but
# symbolic links and aliases may be used to point to other locations.
#
DocumentRoot "/var/www/html"

#
# Each directory to which Apache has access can be configured with respect
# to which services and features are allowed and/or disabled in that
# directory (and its subdirectories).
#
# First, we configure the "default" to be a very restrictive set of
# features. 
#
<Directory />
    Options FollowSymLinks
    AllowOverride None
</Directory>

#
# Note that from this point forward you must specifically allow
# particular features to be enabled - so if something's not working as
# you might expect, make sure that you have specifically enabled it
# below.
#

#
# This should be changed to whatever you set DocumentRoot to.
#
<Directory "/var/www/html">

#
# Possible values for the Options directive are "None", "All",
# or any combination of:
#   Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
#
# Note that "MultiViews" must be named *explicitly* --- "Options All"
# doesn't give it to you.
#
# The Options directive is both complicated and important.  Please see
# http://httpd.apache.org/docs/2.2/mod/core.html#options
# for more information.
#
    Options Indexes FollowSymLinks

#
# AllowOverride controls what directives may be placed in .htaccess files.
# It can be "All", "None", or any combination of the keywords:
#   Options FileInfo AuthConfig Limit
#
    AllowOverride None

#
# Controls who can get stuff from this server.
#
    Order allow,deny
    Allow from all

</Directory>

#
# UserDir: The name of the directory that is appended onto a user's home
# directory if a ~user request is received.
#
# The path to the end user account 'public_html' directory must be
# accessible to the webserver userid.  This usually means that ~userid
# must have permissions of 711, ~userid/public_html must have permissions
# of 755, and documents contained therein must be world-readable.
# Otherwise, the client will only receive a "403 Forbidden" message.
#
# See also: http://httpd.apache.org/docs/misc/FAQ.html#forbidden
#
<IfModule mod_userdir.c>
    #
    # UserDir is disabled by default since it can confirm the presence
    # of a username on the system (depending on home directory
    # permissions).
    #
    UserDir disabled

    #
    # To enable requests to /~user/ to serve the user's public_html
    # directory, remove the "UserDir disabled" line above, and uncomment
    # the following line instead:
    #
    #UserDir public_html

</IfModule>

#
# Control access to UserDir directories.  The following is an example
# for a site where these directories are restricted to read-only.
#
#<Directory /home/*/public_html>
#    AllowOverride FileInfo AuthConfig Limit
#    Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec
#    <Limit GET POST OPTIONS>
#        Order allow,deny
#        Allow from all
#    </Limit>
#    <LimitExcept GET POST OPTIONS>
#        Order deny,allow
#        Deny from all
#    </LimitExcept>
#</Directory>

#
# DirectoryIndex: sets the file that Apache will serve if a directory
# is requested.
#
# The index.html.var file (a type-map) is used to deliver content-
# negotiated documents.  The MultiViews Option can be used for the
# same purpose, but it is much slower.
#
DirectoryIndex index.html index.html.var

#
# AccessFileName: The name of the file to look for in each directory
# for additional configuration directives.  See also the AllowOverride
# directive.
#
AccessFileName .htaccess

#
# The following lines prevent .htaccess and .htpasswd files from being
# viewed by Web clients.
#
<Files ~ "^\.ht">
    Order allow,deny
    Deny from all
    Satisfy All
</Files>

#
# TypesConfig describes where the mime.types file (or equivalent) is
# to be found.
#
TypesConfig /etc/mime.types

#
# DefaultType is the default MIME type the server will use for a document
# if it cannot otherwise determine one, such as from filename extensions.
# If your server contains mostly text or HTML documents, "text/plain" is
# a good value.  If most of your content is binary, such as applications
# or images, you may want to use "application/octet-stream" instead to
# keep browsers from trying to display binary files as though they are
# text.
#
DefaultType text/plain

#
# The mod_mime_magic module allows the server to use various hints from the
# contents of the file itself to determine its type.  The MIMEMagicFile
# directive tells the module where the hint definitions are located.
#
<IfModule mod_mime_magic.c>
#   MIMEMagicFile /usr/share/magic.mime
    MIMEMagicFile conf/magic
</IfModule>

#
# HostnameLookups: Log the names of clients or just their IP addresses
# e.g., www.apache.org (on) or 204.62.129.132 (off).
# The default is off because it'd be overall better for the net if people
# had to knowingly turn this feature on, since enabling it means that
# each client request will result in AT LEAST one lookup request to the
# nameserver.
#
HostnameLookups Off

#
# EnableMMAP: Control whether memory-mapping is used to deliver
# files (assuming that the underlying OS supports it).
# The default is on; turn this off if you serve from NFS-mounted
# filesystems.  On some systems, turning it off (regardless of
# filesystem) can improve performance; for details, please see
# http://httpd.apache.org/docs/2.2/mod/core.html#enablemmap
#
#EnableMMAP off

#
# EnableSendfile: Control whether the sendfile kernel support is
# used to deliver files (assuming that the OS supports it).
# The default is on; turn this off if you serve from NFS-mounted
# filesystems.  Please see
# http://httpd.apache.org/docs/2.2/mod/core.html#enablesendfile
#
#EnableSendfile off

#
# ErrorLog: The location of the error log file.
# If you do not specify an ErrorLog directive within a <VirtualHost>
# container, error messages relating to that virtual host will be
# logged here.  If you *do* define an error logfile for a <VirtualHost>
# container, that host's errors will be logged there and not here.
#
ErrorLog logs/error_log

#
# LogLevel: Control the number of messages logged to the error_log.
# Possible values include: debug, info, notice, warn, error, crit,
# alert, emerg.
#
LogLevel warn

#
# The following directives define some format nicknames for use with
# a CustomLog directive (see below).
#
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
LogFormat "%h %l %u %t \"%r\" %>s %b" common
LogFormat "%{Referer}i -> %U" referer
LogFormat "%{User-agent}i" agent

# "combinedio" includes actual counts of actual bytes received (%I) and sent (%O); this
# requires the mod_logio module to be loaded.
#LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio

#
# The location and format of the access logfile (Common Logfile Format).
# If you do not define any access logfiles within a <VirtualHost>
# container, they will be logged here.  Contrariwise, if you *do*
# define per-<VirtualHost> access logfiles, transactions will be
# logged therein and *not* in this file.
#
#CustomLog logs/access_log common

#
# If you would like to have separate agent and referer logfiles, uncomment
# the following directives.
#
#CustomLog logs/referer_log referer
#CustomLog logs/agent_log agent

#
# For a single logfile with access, agent, and referer information
# (Combined Logfile Format), use the following directive:
#
CustomLog logs/access_log combined

#
# Optionally add a line containing the server version and virtual host
# name to server-generated pages (internal error documents, FTP directory
# listings, mod_status and mod_info output etc., but not CGI generated
# documents or custom error documents).
# Set to "EMail" to also include a mailto: link to the ServerAdmin.
# Set to one of:  On | Off | EMail
#
ServerSignature On

#
# Aliases: Add here as many aliases as you need (with no limit). The format is
# Alias fakename realname
#
# Note that if you include a trailing / on fakename then the server will
# require it to be present in the URL.  So "/icons" isn't aliased in this
# example, only "/icons/".  If the fakename is slash-terminated, then the
# realname must also be slash terminated, and if the fakename omits the
# trailing slash, the realname must also omit it.
#
# We include the /icons/ alias for FancyIndexed directory listings.  If you
# do not use FancyIndexing, you may comment this out.
#
Alias /icons/ "/var/www/icons/"

<Directory "/var/www/icons">
    Options Indexes MultiViews FollowSymLinks
    AllowOverride None
    Order allow,deny
    Allow from all
</Directory>

#
# WebDAV module configuration section.
#
<IfModule mod_dav_fs.c>
    # Location of the WebDAV lock database.
    DAVLockDB /var/lib/dav/lockdb
</IfModule>

#
# ScriptAlias: This controls which directories contain server scripts.
# ScriptAliases are essentially the same as Aliases, except that
# documents in the realname directory are treated as applications and
# run by the server when requested rather than as documents sent to the client.
# The same rules about trailing "/" apply to ScriptAlias directives as to
# Alias.
#
ScriptAlias /cgi-bin/ "/var/www/cgi-bin/"

#
# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased
# CGI directory exists, if you have that configured.
#
<Directory "/var/www/cgi-bin">
    AllowOverride None
    Options None
    Order allow,deny
    Allow from all
</Directory>

#
# Redirect allows you to tell clients about documents which used to exist in
# your server's namespace, but do not anymore. This allows you to tell the
# clients where to look for the relocated document.
# Example:
# Redirect permanent /foo http://www.example.com/bar

#
# Directives controlling the display of server-generated directory listings.
#

#
# IndexOptions: Controls the appearance of server-generated directory
# listings.
#
IndexOptions FancyIndexing VersionSort NameWidth=* HTMLTable Charset=UTF-8

#
# AddIcon* directives tell the server which icon to show for different
# files or filename extensions.  These are only displayed for
# FancyIndexed directories.
#
AddIconByEncoding (CMP,/icons/compressed.gif) x-compress x-gzip

AddIconByType (TXT,/icons/text.gif) text/*
AddIconByType (IMG,/icons/image2.gif) image/*
AddIconByType (SND,/icons/sound2.gif) audio/*
AddIconByType (VID,/icons/movie.gif) video/*

AddIcon /icons/binary.gif .bin .exe
AddIcon /icons/binhex.gif .hqx
AddIcon /icons/tar.gif .tar
AddIcon /icons/world2.gif .wrl .wrl.gz .vrml .vrm .iv
AddIcon /icons/compressed.gif .Z .z .tgz .gz .zip
AddIcon /icons/a.gif .ps .ai .eps
AddIcon /icons/layout.gif .html .shtml .htm .pdf
AddIcon /icons/text.gif .txt
AddIcon /icons/c.gif .c
AddIcon /icons/p.gif .pl .py
AddIcon /icons/f.gif .for
AddIcon /icons/dvi.gif .dvi
AddIcon /icons/uuencoded.gif .uu
AddIcon /icons/script.gif .conf .sh .shar .csh .ksh .tcl
AddIcon /icons/tex.gif .tex
AddIcon /icons/bomb.gif core

AddIcon /icons/back.gif ..
AddIcon /icons/hand.right.gif README
AddIcon /icons/folder.gif ^^DIRECTORY^^
AddIcon /icons/blank.gif ^^BLANKICON^^

#
# DefaultIcon is which icon to show for files which do not have an icon
# explicitly set.
#
DefaultIcon /icons/unknown.gif

#
# AddDescription allows you to place a short description after a file in
# server-generated indexes.  These are only displayed for FancyIndexed
# directories.
# Format: AddDescription "description" filename
#
#AddDescription "GZIP compressed document" .gz
#AddDescription "tar archive" .tar
#AddDescription "GZIP compressed tar archive" .tgz

#
# ReadmeName is the name of the README file the server will look for by
# default, and append to directory listings.
#
# HeaderName is the name of a file which should be prepended to
# directory indexes.
ReadmeName README.html
HeaderName HEADER.html

#
# IndexIgnore is a set of filenames which directory indexing should ignore
# and not include in the listing.  Shell-style wildcarding is permitted.
#
IndexIgnore .??* *~ *# HEADER* README* RCS CVS *,v *,t

#
# DefaultLanguage and AddLanguage allows you to specify the language of
# a document. You can then use content negotiation to give a browser a
# file in a language the user can understand.
#
# Specify a default language. This means that all data
# going out without a specific language tag (see below) will
# be marked with this one. You probably do NOT want to set
# this unless you are sure it is correct for all cases.
#
# * It is generally better to not mark a page as
# * being a certain language than marking it with the wrong
# * language!
#
# DefaultLanguage nl
#
# Note 1: The suffix does not have to be the same as the language
# keyword --- those with documents in Polish (whose net-standard
# language code is pl) may wish to use "AddLanguage pl .po" to
# avoid the ambiguity with the common suffix for perl scripts.
#
# Note 2: The example entries below illustrate that in some cases
# the two character 'Language' abbreviation is not identical to
# the two character 'Country' code for its country,
# E.g. 'Danmark/dk' versus 'Danish/da'.
#
# Note 3: In the case of 'ltz' we violate the RFC by using a three char
# specifier. There is 'work in progress' to fix this and get
# the reference data for rfc1766 cleaned up.
#
# Catalan (ca) - Croatian (hr) - Czech (cs) - Danish (da) - Dutch (nl)
# English (en) - Esperanto (eo) - Estonian (et) - French (fr) - German (de)
# Greek-Modern (el) - Hebrew (he) - Italian (it) - Japanese (ja)
# Korean (ko) - Luxembourgeois* (ltz) - Norwegian Nynorsk (nn)
# Norwegian (no) - Polish (pl) - Portugese (pt)
# Brazilian Portuguese (pt-BR) - Russian (ru) - Swedish (sv)
# Simplified Chinese (zh-CN) - Spanish (es) - Traditional Chinese (zh-TW)
#
AddLanguage ca .ca
AddLanguage cs .cz .cs
AddLanguage da .dk
AddLanguage de .de
AddLanguage el .el
AddLanguage en .en
AddLanguage eo .eo
AddLanguage es .es
AddLanguage et .et
AddLanguage fr .fr
AddLanguage he .he
AddLanguage hr .hr
AddLanguage it .it
AddLanguage ja .ja
AddLanguage ko .ko
AddLanguage ltz .ltz
AddLanguage nl .nl
AddLanguage nn .nn
AddLanguage no .no
AddLanguage pl .po
AddLanguage pt .pt
AddLanguage pt-BR .pt-br
AddLanguage ru .ru
AddLanguage sv .sv
AddLanguage zh-CN .zh-cn
AddLanguage zh-TW .zh-tw

#
# LanguagePriority allows you to give precedence to some languages
# in case of a tie during content negotiation.
#
# Just list the languages in decreasing order of preference. We have
# more or less alphabetized them here. You probably want to change this.
#
LanguagePriority en ca cs da de el eo es et fr he hr it ja ko ltz nl nn no pl pt pt-BR ru sv zh-CN zh-TW

#
# ForceLanguagePriority allows you to serve a result page rather than
# MULTIPLE CHOICES (Prefer) [in case of a tie] or NOT ACCEPTABLE (Fallback)
# [in case no accepted languages matched the available variants]
#
ForceLanguagePriority Prefer Fallback

#
# Specify a default charset for all content served; this enables
# interpretation of all content as UTF-8 by default.  To use the
# default browser choice (ISO-8859-1), or to allow the META tags
# in HTML content to override this choice, comment out this
# directive:
#
AddDefaultCharset UTF-8

#
# AddType allows you to add to or override the MIME configuration
# file mime.types for specific file types.
#
#AddType application/x-tar .tgz

#
# AddEncoding allows you to have certain browsers uncompress
# information on the fly. Note: Not all browsers support this.
# Despite the name similarity, the following Add* directives have nothing
# to do with the FancyIndexing customization directives above.
#
#AddEncoding x-compress .Z
#AddEncoding x-gzip .gz .tgz

# If the AddEncoding directives above are commented-out, then you
# probably should define those extensions to indicate media types:
#
AddType application/x-compress .Z
AddType application/x-gzip .gz .tgz

#
#   MIME-types for downloading Certificates and CRLs
#
AddType application/x-x509-ca-cert .crt
AddType application/x-pkcs7-crl    .crl

#
# AddHandler allows you to map certain file extensions to "handlers":
# actions unrelated to filetype. These can be either built into the server
# or added with the Action directive (see below)
#
# To use CGI scripts outside of ScriptAliased directories:
# (You will also need to add "ExecCGI" to the "Options" directive.)
#
#AddHandler cgi-script .cgi

#
# For files that include their own HTTP headers:
#
#AddHandler send-as-is asis

#
# For type maps (negotiated resources):
# (This is enabled by default to allow the Apache "It Worked" page
#  to be distributed in multiple languages.)
#
AddHandler type-map var

#
# Filters allow you to process content before it is sent to the client.
#
# To parse .shtml files for server-side includes (SSI):
# (You will also need to add "Includes" to the "Options" directive.)
#
AddType text/html .shtml
AddOutputFilter INCLUDES .shtml

#
# Action lets you define media types that will execute a script whenever
# a matching file is called. This eliminates the need for repeated URL
# pathnames for oft-used CGI file processors.
# Format: Action media/type /cgi-script/location
# Format: Action handler-name /cgi-script/location
#

#
# Customizable error responses come in three flavors:
# 1) plain text 2) local redirects 3) external redirects
#
# Some examples:
#ErrorDocument 500 "The server made a boo boo."
#ErrorDocument 404 /missing.html
#ErrorDocument 404 "/cgi-bin/missing_handler.pl"
#ErrorDocument 402 http://www.example.com/subscription_info.html
#

#
# Putting this all together, we can internationalize error responses.
#
# We use Alias to redirect any /error/HTTP_<error>.html.var response to
# our collection of by-error message multi-language collections.  We use
# includes to substitute the appropriate text.
#
# You can modify the messages' appearance without changing any of the
# default HTTP_<error>.html.var files by adding the line:
#
#   Alias /error/include/ "/your/include/path/"
#
# which allows you to create your own set of files by starting with the
# /var/www/error/include/ files and
# copying them to /your/include/path/, even on a per-VirtualHost basis.
#

Alias /error/ "/var/www/error/"

<IfModule mod_negotiation.c>
<IfModule mod_include.c>
    <Directory "/var/www/error">
        AllowOverride None
        Options IncludesNoExec
        AddOutputFilter Includes html
        AddHandler type-map var
        Order allow,deny
        Allow from all
        LanguagePriority en es de fr
        ForceLanguagePriority Prefer Fallback
    </Directory>

#    ErrorDocument 400 /error/HTTP_BAD_REQUEST.html.var
#    ErrorDocument 401 /error/HTTP_UNAUTHORIZED.html.var
#    ErrorDocument 403 /error/HTTP_FORBIDDEN.html.var
#    ErrorDocument 404 /error/HTTP_NOT_FOUND.html.var
#    ErrorDocument 405 /error/HTTP_METHOD_NOT_ALLOWED.html.var
#    ErrorDocument 408 /error/HTTP_REQUEST_TIME_OUT.html.var
#    ErrorDocument 410 /error/HTTP_GONE.html.var
#    ErrorDocument 411 /error/HTTP_LENGTH_REQUIRED.html.var
#    ErrorDocument 412 /error/HTTP_PRECONDITION_FAILED.html.var
#    ErrorDocument 413 /error/HTTP_REQUEST_ENTITY_TOO_LARGE.html.var
#    ErrorDocument 414 /error/HTTP_REQUEST_URI_TOO_LARGE.html.var
#    ErrorDocument 415 /error/HTTP_UNSUPPORTED_MEDIA_TYPE.html.var
#    ErrorDocument 500 /error/HTTP_INTERNAL_SERVER_ERROR.html.var
#    ErrorDocument 501 /error/HTTP_NOT_IMPLEMENTED.html.var
#    ErrorDocument 502 /error/HTTP_BAD_GATEWAY.html.var
#    ErrorDocument 503 /error/HTTP_SERVICE_UNAVAILABLE.html.var
#    ErrorDocument 506 /error/HTTP_VARIANT_ALSO_VARIES.html.var

</IfModule>
</IfModule>

#
# The following directives modify normal HTTP response behavior to
# handle known problems with browser implementations.
#
BrowserMatch "Mozilla/2" nokeepalive
BrowserMatch "MSIE 4\.0b2;" nokeepalive downgrade-1.0 force-response-1.0
BrowserMatch "RealPlayer 4\.0" force-response-1.0
BrowserMatch "Java/1\.0" force-response-1.0
BrowserMatch "JDK/1\.0" force-response-1.0

#
# The following directive disables redirects on non-GET requests for
# a directory that does not include the trailing slash.  This fixes a
# problem with Microsoft WebFolders which does not appropriately handle
# redirects for folders with DAV methods.
# Same deal with Apple's DAV filesystem and Gnome VFS support for DAV.
#
BrowserMatch "Microsoft Data Access Internet Publishing Provider" redirect-carefully
BrowserMatch "MS FrontPage" redirect-carefully
BrowserMatch "^WebDrive" redirect-carefully
BrowserMatch "^WebDAVFS/1.[0123]" redirect-carefully
BrowserMatch "^gnome-vfs/1.0" redirect-carefully
BrowserMatch "^XML Spy" redirect-carefully
BrowserMatch "^Dreamweaver-WebDAV-SCM1" redirect-carefully

#
# Allow server status reports generated by mod_status,
# with the URL of http://servername/server-status
# Change the ".example.com" to match your domain to enable.
#
#<Location /server-status>
#    SetHandler server-status
#    Order deny,allow
#    Deny from all
#    Allow from .example.com
#</Location>

#
# Allow remote server configuration reports, with the URL of
http://servername/server-info (requires that mod_info.c be loaded).
# Change the ".example.com" to match your domain to enable.
#
#<Location /server-info>
#    SetHandler server-info
#    Order deny,allow
#    Deny from all
#    Allow from .example.com
#</Location>

#
# Proxy Server directives. Uncomment the following lines to
# enable the proxy server:
#
#<IfModule mod_proxy.c>
#ProxyRequests On
#
#<Proxy *>
#    Order deny,allow
#    Deny from all
#    Allow from .example.com
#</Proxy>

#
# Enable/disable the handling of HTTP/1.1 "Via:" headers.
# ("Full" adds the server version; "Block" removes all outgoing Via: headers)
# Set to one of: Off | On | Full | Block
#
#ProxyVia On

#
# To enable a cache of proxied content, uncomment the following lines.
# See http://httpd.apache.org/docs/2.2/mod/mod_cache.html for more details.
#
#<IfModule mod_disk_cache.c>
#   CacheEnable disk /
#   CacheRoot "/var/cache/mod_proxy"
#</IfModule>
#

#</IfModule>
# End of proxy directives.

### Section 3: Virtual Hosts
#
# VirtualHost: If you want to maintain multiple domains/hostnames on your
# machine you can setup VirtualHost containers for them. Most configurations
# use only name-based virtual hosts so the server doesn't need to worry about
# IP addresses. This is indicated by the asterisks in the directives below.
#
# Please see the documentation at
# <URL:http://httpd.apache.org/docs/2.2/vhosts/>
# for further details before you try to setup virtual hosts.
#
# You may use the command line option '-S' to verify your virtual host
# configuration.

#
# Use name-based virtual hosting.
#
#NameVirtualHost *:80
#
# NOTE: NameVirtualHost cannot be used without a port specifier
# (e.g. :80) if mod_ssl is being used, due to the nature of the
# SSL protocol.
#

#
# VirtualHost example:
# Almost any Apache directive may go into a VirtualHost container.
# The first VirtualHost section is used for requests without a known
# server name.
#
#<VirtualHost *:80>
#    ServerAdmin webmaster@xxxxxxxxxxxxxxxxxxxxxx
#    DocumentRoot /www/docs/dummy-host.example.com
#    ServerName dummy-host.example.com
#    ErrorLog logs/dummy-host.example.com-error_log
#    CustomLog logs/dummy-host.example.com-access_log common
#</VirtualHost>

NameVirtualHost *:443
<VirtualHost *:443>
        SSLEngine on
        SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP

        SSLCertificateFile      /etc/ssl/certs/server.crt
        SSLCertificateKeyFile   /etc/ssl/certs/server.key

        DocumentRoot /var/www/web1/web/
        <Directory /var/www/web1/web/>
                Options Indexes MultiViews
                AllowOverride None
                Order allow,deny
                allow from all
        </Directory>

        Alias /webdav /var/www/web1/web

        <Location /webdav>
           DAV On
           AuthType Basic
           AuthName "webdav"
           AuthUserFile /var/www/web1/passwd.dav
           Require valid-user
       </Location>

</VirtualHost>
##########################################################################################################################






2.
Following is the startup info when I do "sudo service httpd start" ::

##########################################################################################################################
[ajay@ajay ~]$ sudo service httpd start
Starting httpd: [Wed Mar 21 11:20:59 2012] [warn] module ssl_module is already loaded, skipping
httpd: Could not reliably determine the server's fully qualified domain name, using ::1 for ServerName
Apache/2.2.17 mod_ssl/2.2.17 (Pass Phrase Dialog)
Some of your private key files are encrypted for security reasons.
In order to read them you have to provide the pass phrases.

Server ::1:443 (RSA)
Enter pass phrase:

OK: Pass Phrase Dialog successful.
                                                           [  OK  ]
##########################################################################################################################







3.
Following are the parameters I enter in gnome-nautilus ::

###########################################################################################################################
Service type:                       Secure WebDAV (HTTPS)
Server:                                localhost

Optional information:
Port:                                    443
Folder:                                 webdav
User Name:                          

Add bookmark
Bookmark name:                     
###########################################################################################################################



4.
Finally, upon clikcing "Connect", I get the popup with the following message ::

###########################################################################################################################
Cannot display location "davs://
localhost/webdav"

HTTP Error: Cannot connect to destination (localhost)
###########################################################################################################################







I will be obliged for any pointers. I have been going nuts for three days :|

Looking forward to a reply.


Regards,
Ajay






--
Gr,

Mathijs




[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux