Skip to content
Snippets Groups Projects
Commit 811783e0 authored by paulmer's avatar paulmer
Browse files

Archivos máquina 14

parent 3bc11d1e
No related branches found
No related tags found
No related merge requests found
<VirtualHost *:80>
# The ServerName directive sets the request scheme, hostname and port that
# the server uses to identify itself. This is used when creating
# redirection URLs. In the context of virtual hosts, the ServerName
# specifies what hostname must appear in the request's Host: header to
# match this virtual host. For the default virtual host (this file) this
# value is not decisive as it is used as a last resort host regardless.
# However, you must set it for any further virtual host explicitly.
#ServerName www.example.com
ServerAdmin webmaster@localhost
DocumentRoot /var/www/html
# Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the loglevel for particular
# modules, e.g.
#LogLevel info ssl:warn
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
# For most configuration files from conf-available/, which are
# enabled or disabled at a global level, it is possible to
# include a line for only one particular virtual host. For example the
# following line enables the CGI configuration for this host only
# after it has been globally disabled with "a2disconf".
#Include conf-available/serve-cgi-bin.conf
# ************************* TFG ****************************
RewriteEngine On
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ https://192.168.2.14:443/$1 [L,R=301]
# **********************************************************
</VirtualHost>
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
-----BEGIN PRIVATE KEY-----
MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQDEaEkSdA0cOTL6
62XR9N2WbIVIsTt7IioTf2nQEFIrJow8UmXuYuRb9hIGtn91PDVCIQyZ6FE+R7ly
fHBsjgG75fyj9HShYgeixN3q5gktLvMKM2+AVylgJh71S2KyHqkMw2CbZw26R3SL
a5UqPXIrQ0DTx63hZjDWIALg+Z8FJn857UzV/tD2TRpRD0mOVtnNAnpDItPxtoDO
n/N4gnt59HEJ64NOTHgF9eIRPNFEb9BY+ZKVnj2gJlzYxq0yfLF9k32raEAXHTcn
eXBxy8sVHXUhib0pE+vCXRmdfdFKobf6Lw1R0lZbcL7TcoYFzkHc6vD2f5CDDzgy
Gdd1yfR2EEAfJrUPRI40nG+sYOul5J4StQ9SSiAw3VwRXRQv3/vAJT8xTvLMsUU1
41KCW43EATTWyORUK34UEuJRgvX/atkjCTDYLZUHQkce/V1nyR38gZb2seOxZI5z
9x3o4HF1EVhDnXDHWbGNbDeJD9xwB6/s+/E1L9zI3wBhReL9sjbQH/rEY5sf3kBg
sJaHJQ0yoVR81j0jN8sxVL3mrek2T0doLWsWwhi0VM8gYWpS9gz48XE0biDbfVc3
Aj7AhjOP6B2I0kSUGhzVLfB/z6HW6dna5Mcs9tWI/E4OFq+TSSNQCCJDZR6GNmwz
SdtBqQB5HqXndUxF9KKDttA3kV7WVQIDAQABAoICAQCLHN5c3qwGiJEOXrrwukJU
8Cp7cWUS8wDgbIey4kyA2b3MYARok8zxQdpEvPCMRgfm/eeh/4XD2iOE7pTmnrKl
tuF584TEZd3IsS4J2cM4KJ/mYsYgHhxlSLr2vN18EfFk4+HCUHzNqxzmP14Y3ArI
j8sT9cO3+ZyvnV7MoKG8kSbeDbE1hVXWjogMUAqmcee0qIOWl82Mz9pt/6cAfVMd
70A9aX3IcKs2dZEY6n3CvnvQ+XyU0s8NZv6uYBJ+xwkkS9pgFOgINx5ArGgzgcgm
/YVgKuI7fSuosC6beWlLNj5MSxVhFd0qyTGwLNa2t/+4jQP9ZB8kZRxFiD4u5Mtr
sUzy4qe12zKwiXigOaKTO8QlFuk4Y7mmfK7yTYaFTIQOAyks+DyNEp0JGbLBXmub
N2af3631dskf5dzjyAlJmHyn8s+t5HrKKESDQc80kdkYciauycecYakbI80aXagQ
cQC3IiB6jmHWBUPjoToWOJlf2iYJUOz6S4yM7H0P+3tD4v4lrVWXP0sSLZ5KlLTc
u0NF9n+XEGghIwy42+qxVRmVoMFwXu5IEaQzJ5L30tgZkkPgCE7nSBUCrdXXNi/E
07tAWsx/G/Ul3HGwQaB+Txo7NaURO3olN8CFM93beEu/KnlvMxxHM2Hnb3padb+b
75OG8CV/P1e2KonBMi6n5QKCAQEA9kt2y0x1I0+gcJgCkqu9XFBsKsENPjJQVxv6
+4/GhapKNWlcyWsTmKRfJRK9/yl+612dW+MrR6qbGHnZoWOYZY8FE3xsVmsToAjQ
qftXZLHij8B0fjY9gcS6ojaKoBQSSqB3beVyFHKmmx2i4Cwlz6SFnHXUy1rgFlCE
G1ZzLQqk7f3KErdJK4n2XyWSErNAWRmCq7c4XqhwFRumVNGuJvmLDXlQC4HVcgU1
45FgSjlK698WCz0I/x5mA9E2+W9gmCDaLfbxat7i7oXeeH/QpEMOqPDKI9niv4Yl
MVwp708VrzOPF+OMdnvORcjtL0WzNUNGh0OD2Z7Spja2YW2x4wKCAQEAzCWTE7Gp
aCiaYVemtG35yAsc8lazUakSKbZI3MtsZZmTxCZqFIUQJ6JKdcLNe1HhIE8c7wg+
5WlADt6tq09BB3jZPZKT0r+FITYNepCA7NqQmSJcrOUJjM0bEZYovEBBUm2b+ulS
OLJr+FGXDRg+sFbvPLolQAkGcjUWNoWn4m313/8rR+YrFV+0xalRwEC8KbXfMY6j
k/zi0TmAEfN8DDStp8tuCpLLii2SpnK1gALA3UxDp9EI8rUydgR1x0wGN7Fvby8L
XKdYGFylWReUWHVWL6t8U/ROGmE/o4rzeQmAByn7K/Ybt+oGmlFEbo5L5xU9U1S9
0j6T7YTuAPXsZwKCAQA10d2+pRF/ytmjYQRG6rJxZr2MRi1Ppwz5TAr3R7643LJk
o4Z8GSLqGxkTb9oG1Rl/8y/8sVJ20agcnBvbcXkO0EbqsCi4ZaOfN+3pBxxcy6ZX
hVWvcsjT/5pM8iAuxNQObKxMXnQkVb1kbgB2fg8xJaFwxCrg2RXYqnWDx8tZT1cl
Dm1G07hwhDBLMFmQLo1kKvfr8BioTqRXaHhbVop4x9UD97tvGEr9JHhXJyBkd8qQ
ampVwFuj7A+cy+34accw1xT2MF0m3le2iZhIup1sF58veZaiaO1srrKX66zaN2zk
oR6muLmr9nfntfVmfBOiEvZpfm5kcplTaudFuQPDAoIBAGHzYWdgpizw1moAWV9X
KTL/igsI6I809R8IdFtkS4VQM+M4n0trMP4jU2C/cEJMXh1XeEWEilEet/qqg1+f
7k68gFeXvc+vzxvJSJxXO1Tp5dlj8F2Qo41oWCWPC8qPdggryVyRmL7VdRK3ayeA
S4vmmnFjyz23Vt1zdU4BwTTWl9O7JjQgTum5ew4gGLaLGP1WY1nu27PE8bt7wGRc
lFdy6yOIaystlfWdujCc91MNfyZvUkLx/D4gDK8toqlWY+FTBGmvg98X+B/wS/G8
a5Qp8Il82XGa1eK4aIV6xSl9Em3dicNlGZWb90ER3yjAo9Cjk0Ipdc6r8eRUFLJn
TN8CggEAadc1afS8FzAIt0H3pmg0oq+vqfX8gFBgh8sHtOwXGOm7pzZediOeaCf9
MhijALZiqBlCxZ6nCuHvyNL32bXt5BFVHu4ob0q5cfVIh5kmeEiAnZiO4cFnlwKg
mx1D05CXWIW3y32+0hKg5UfGZgOxc6luRM1jjcI+JBVg6X8Z7pL3cic6Cc9s05Ij
RJZV1cCYN+6Tjz1+kdHAsD44AfXy1ARdwfucjngAxKo26pErsgOMlv2j1meDU/P7
2s5s++7TIaoxRvKJtyBabqiIH7QczXofsbm7lUYXZDY7SL3aLYfm4RxX0DeLN6q+
IVPHunbVZSZ95C+8w/wbgG0MNA11WQ==
-----END PRIVATE KEY-----
<IfModule mod_ssl.c>
<VirtualHost _default_:443>
ServerAdmin webmaster@localhost
DocumentRoot /var/www/html
# Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the loglevel for particular
# modules, e.g.
#LogLevel info ssl:warn
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
# For most configuration files from conf-available/, which are
# enabled or disabled at a global level, it is possible to
# include a line for only one particular virtual host. For example the
# following line enables the CGI configuration for this host only
# after it has been globally disabled with "a2disconf".
#Include conf-available/serve-cgi-bin.conf
# SSL Engine Switch:
# Enable/Disable SSL for this virtual host.
SSLEngine on
# A self-signed (snakeoil) certificate can be created by installing
# the ssl-cert package. See
# /usr/share/doc/apache2/README.Debian.gz for more info.
# If both key and certificate are stored in the same file, only the
# SSLCertificateFile directive is needed.
SSLCertificateFile /etc/apache2/certificates/apache-cert.crt
SSLCertificateKeyFile /etc/apache2/certificates/apache.key
# Server Certificate Chain:
# Point SSLCertificateChainFile at a file containing the
# concatenation of PEM encoded CA certificates which form the
# certificate chain for the server certificate. Alternatively
# the referenced file can be the same as SSLCertificateFile
# when the CA certificates are directly appended to the server
# certificate for convinience.
#SSLCertificateChainFile /etc/apache2/ssl.crt/server-ca.crt
# Certificate Authority (CA):
# Set the CA certificate verification path where to find CA
# certificates for client authentication or alternatively one
# huge file containing all of them (file must be PEM encoded)
# Note: Inside SSLCACertificatePath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
#SSLCACertificatePath /etc/ssl/certs/
#SSLCACertificateFile /etc/apache2/ssl.crt/ca-bundle.crt
# Certificate Revocation Lists (CRL):
# Set the CA revocation path where to find CA CRLs for client
# authentication or alternatively one huge file containing all
# of them (file must be PEM encoded)
# Note: Inside SSLCARevocationPath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
#SSLCARevocationPath /etc/apache2/ssl.crl/
#SSLCARevocationFile /etc/apache2/ssl.crl/ca-bundle.crl
# Client Authentication (Type):
# Client certificate verification type and depth. Types are
# none, optional, require and optional_no_ca. Depth is a
# number which specifies how deeply to verify the certificate
# issuer chain before deciding the certificate is not valid.
#SSLVerifyClient require
#SSLVerifyDepth 10
# SSL Engine Options:
# Set various options for the SSL engine.
# o FakeBasicAuth:
# Translate the client X.509 into a Basic Authorisation. This means that
# the standard Auth/DBMAuth methods can be used for access control. The
# user name is the `one line' version of the client's X.509 certificate.
# Note that no password is obtained from the user. Every entry in the user
# file needs this password: `xxj31ZMTZzkVA'.
# o ExportCertData:
# This exports two additional environment variables: SSL_CLIENT_CERT and
# SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
# server (always existing) and the client (only existing when client
# authentication is used). This can be used to import the certificates
# into CGI scripts.
# o StdEnvVars:
# This exports the standard SSL/TLS related `SSL_*' environment variables.
# Per default this exportation is switched off for performance reasons,
# because the extraction step is an expensive operation and is usually
# useless for serving static content. So one usually enables the
# exportation for CGI and SSI requests only.
# o OptRenegotiate:
# This enables optimized SSL connection renegotiation handling when SSL
# directives are used in per-directory context.
#SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
<FilesMatch "\.(cgi|shtml|phtml|php)$">
SSLOptions +StdEnvVars
</FilesMatch>
<Directory /usr/lib/cgi-bin>
SSLOptions +StdEnvVars
</Directory>
# SSL Protocol Adjustments:
# The safe and default but still SSL/TLS standard compliant shutdown
# approach is that mod_ssl sends the close notify alert but doesn't wait for
# the close notify alert from client. When you need a different shutdown
# approach you can use one of the following variables:
# o ssl-unclean-shutdown:
# This forces an unclean shutdown when the connection is closed, i.e. no
# SSL close notify alert is send or allowed to received. This violates
# the SSL/TLS standard but is needed for some brain-dead browsers. Use
# this when you receive I/O errors because of the standard approach where
# mod_ssl sends the close notify alert.
# o ssl-accurate-shutdown:
# This forces an accurate shutdown when the connection is closed, i.e. a
# SSL close notify alert is send and mod_ssl waits for the close notify
# alert of the client. This is 100% SSL/TLS standard compliant, but in
# practice often causes hanging connections with brain-dead browsers. Use
# this only for browsers where you know that their SSL implementation
# works correctly.
# Notice: Most problems of broken clients are also related to the HTTP
# keep-alive facility, so you usually additionally want to disable
# keep-alive for those clients, too. Use variable "nokeepalive" for this.
# Similarly, one has to force some clients to use HTTP/1.0 to workaround
# their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
# "force-response-1.0" for this.
# BrowserMatch "MSIE [2-6]" \
# nokeepalive ssl-unclean-shutdown \
# downgrade-1.0 force-response-1.0
# ********************************* TFG - SOLUCION 1 **************************************
# SSLProxyEngine On
# SSLProxyVerify none
# SSLProxyCheckPeerCN off
# SSLProxyCheckPeerExpire off
# <Location /KTRhg_yaxFhjGXYNAWP4iwOxsNqPIoApEWI>
# RewriteEngine on
# RewriteCond %{HTTP_USER_AGENT} "=Mozilla/5.0 (Macintosh; Intel Mac OS X 12_2_1) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.2 Safari/605.1.15"
# RewriteRule ^(.*)$ "https://192.168.1.40:443/%{REQUEST_URI}" [L,P]
# </Location>
# ***************************************************************************************
# ********************************** TFG SOLUCION 2 **************************************
SSLProxyEngine On
SSLProxyVerify none
SSLProxyCheckPeerCN off
SSLProxyCheckPeerExpire off
<Location /KTRhg_yaxFhjGXYNAWP4iwOxsNqPIoApEWI>
RewriteEngine on
RewriteCond %{REMOTE_ADDR} 192.168.2.11
RewriteCond %{HTTP_USER_AGENT} "=Mozilla/5.0 (Macintosh; Intel Mac OS X 12_2_1) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.2 Safari/605.1.15"
RewriteRule ^(.*)$ "https://192.168.1.40:443/%{REQUEST_URI}" [L,P]
RewriteCond %{REMOTE_ADDR} !192.168.2.11
RewriteCond %{HTTP_USER_AGENT} "=Mozilla/5.0 (Macintosh; Intel Mac OS X 12_2_1) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.2 Safari/605.1.15"
RewriteRule ^(.*)$ "https://192.168.2.12:443/%{REQUEST_URI}" [L,P]
</Location>
# ***************************************************************************************
</VirtualHost>
</IfModule>
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment