<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-149816378162775924</atom:id><lastBuildDate>Wed, 28 Aug 2024 23:56:52 +0000</lastBuildDate><category>ssl certificates</category><category>what is ssl</category><category>ssl</category><category>ssl certificate</category><category>ssl proxy</category><category>ssl web hosting</category><title>SSL Web Hosting</title><description>SSL (Secure Sockets Layer) is a security technology that creates an encrypted link between a web server and a browser. It is a widely used technology that is embedded in all popular browsers and used in millions of electric commerce websites for securing the details of online transactions with their customers. But how does it work? And how do I take advantage of it? Learn all you want to know at SSL Web Hosting. SSL Web Hosting serves you the information about SSL.</description><link>http://sslwebhosting.blogspot.com/</link><managingEditor>noreply@blogger.com (neko19)</managingEditor><generator>Blogger</generator><openSearch:totalResults>4</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-149816378162775924.post-5872160635349666026</guid><pubDate>Sun, 08 Aug 2010 23:50:00 +0000</pubDate><atom:updated>2010-08-09T07:50:34.066+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ssl certificate</category><category domain="http://www.blogger.com/atom/ns#">ssl certificates</category><category domain="http://www.blogger.com/atom/ns#">ssl proxy</category><category domain="http://www.blogger.com/atom/ns#">ssl web hosting</category><category domain="http://www.blogger.com/atom/ns#">what is ssl</category><title>Beginning Guide to Install SSL</title><description>Who needs an SSL certificate?&lt;br /&gt;
&lt;br /&gt;
If you will accept or secure information processing from your website, such as credit card payments online, or other confidential information, you will need an SSL certificate. SSL means Secure Socket Layer. Data shared between users&#39; computers and server are encrypted for security.&lt;br /&gt;
&lt;br /&gt;
There are different kinds of SSL certificates. The price varies very little money, hundreds of dollars per year. Most of your sensitive information, most probably have to spend on an SSL certificate.&lt;br /&gt;
&lt;br /&gt;
Important: Most applications can obtain licenses at a cost less than $ 100 per year. If you accept credit card payments directly from the server, you should contact your bank or credit card payment gateway, to determine their needs. Some are very strict.&lt;br /&gt;
&lt;br /&gt;
Server Requirements&lt;br /&gt;
&lt;br /&gt;
Your server must have the capacity for secure connections. Probably nothing to fear, because most do.&lt;br /&gt;
&lt;br /&gt;
Dedicated IP Address&lt;br /&gt;
&lt;br /&gt;
You will need a special (unique) IP address. If you&#39;re on shared hosting plan, you should ask your hosting company for a dedicated IP address. SSL certificates can not be installed on a shared IP address unless the certificate is shared. This is not a common scenario at all.&lt;br /&gt;
Some hosting companies to move to a dedicated IP address for free. Other charges a fee (usually) small a month for a dedicated IP address.&lt;br /&gt;
&lt;br /&gt;
What you need to buy the certificate&lt;br /&gt;
&lt;br /&gt;
Have to generate a signing request (CSR). If you have never had an SSL certificate on your site, you may have to generate a &quot;key&quot; first. Both are made from the control panel of your server.&lt;br /&gt;
&lt;br /&gt;
Purchase and installation of SSL certificates&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 1. Log in to your server.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 2. Generate the key if there is one already. For the purposes of SEO, you want to be consistent. The industry standard is to include the &quot;www.&quot; with the domain name.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 3. Once the key is generated, it is necessary to generate the CSR. Be sure to select the correct key if you have more than one option (the one with the &quot;www.&quot; The most likely). Enter the information that the server application (country, city, state, etc) and the server display a page with CSR, new on it, or by email to the CSR for you. Keep this page up, or copy and paste the CSR into a text document such as Notepad (word processing like Microsoft Word can spoil) A are considered as CSR: ----- BEGIN CERTIFICATE REQUEST --- - *** There will be several lines of random looking characters here. *** ----- END CERTIFICATE REQUEST ----- Be sure to include the scripts before and after application &quot;in early certificate&quot; and &quot;Certificate Request&quot; at the end of the copy of the CSR&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 4. When you buy an SSL certificate, there will be a way to configure the certificate. They are slightly different, but the instructions should be available from the manufacturer. You have to paste the CSR in a field, and contact information in the highest number in three places. You must enter the certificate holder, name, address, email, etc. For most suppliers, even for the technical contact and billing contact. (All can be the same person)&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 5. Once you submit the CSR and contact information, you must select an email address for approval. The certificate of authority shall submit an email to the address you choose to approve the transaction. The email address for the signatory must be authorized for the domain or server. An email that is acceptable is common admin@mydomain.tld (where &quot;mydomain.tld&quot; is the actual domain that the certificate is installed.) There are many others such as &quot;webmaster&quot; or &quot;ssladmin&quot; that work, so You may need to check.&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 6. Once the agent approves the certificate, the applicant will receive an email containing the certificate (and possibly a &#39;CA package). The certificate will be very similar to CSR, but it will be bigger. Be sure to include all the characters of &quot;Begin Certificate&quot; through (including) the certificate after the dashes. The certificate will look like: ----- BEGIN CERTIFICATE ----- *** There will be several lines of random looking characters here. *** ----- END CERTIFICATE -----&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 7. There are generally two ways to install the certificate. Some servers ask you to paste the certificate (and CA beams where appropriate) in a field on the server. Some will allow you to download the certificate from a text file or e-mail on your computer. The server certificate installed.&lt;br /&gt;
&lt;br /&gt;
If you did everything correctly, you must install without problems. If you receive errors or warnings, you must contact the server administrator for assistance.</description><link>http://sslwebhosting.blogspot.com/2010/08/beginning-guide-to-install-ssl.html</link><author>noreply@blogger.com (neko19)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-149816378162775924.post-484038137625242068</guid><pubDate>Fri, 31 Jul 2009 06:50:00 +0000</pubDate><atom:updated>2009-07-31T15:16:16.653+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ssl</category><category domain="http://www.blogger.com/atom/ns#">ssl certificate</category><category domain="http://www.blogger.com/atom/ns#">ssl certificates</category><category domain="http://www.blogger.com/atom/ns#">ssl proxy</category><category domain="http://www.blogger.com/atom/ns#">ssl web hosting</category><category domain="http://www.blogger.com/atom/ns#">what is ssl</category><title>Web hosting term SSL Certificate (SSL)</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;meta equiv=&quot;Content-Type&quot; content=&quot;text/html; charset=utf-8&quot;&gt;&lt;meta name=&quot;ProgId&quot; content=&quot;Word.Document&quot;&gt;&lt;meta name=&quot;Generator&quot; content=&quot;Microsoft Word 11&quot;&gt;&lt;meta name=&quot;Originator&quot; content=&quot;Microsoft Word 11&quot;&gt;&lt;link rel=&quot;File-List&quot; href=&quot;file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml&quot;&gt;&lt;o:smarttagtype namespaceuri=&quot;urn:schemas-microsoft-com:office:smarttags&quot; name=&quot;country-region&quot;&gt;&lt;/o:smarttagtype&gt;&lt;o:smarttagtype namespaceuri=&quot;urn:schemas-microsoft-com:office:smarttags&quot; name=&quot;place&quot;&gt;&lt;/o:smarttagtype&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; latentstylecount=&quot;156&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if !mso]&gt;&lt;object classid=&quot;clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D&quot; id=&quot;ieooui&quot;&gt;&lt;/object&gt; &lt;style&gt; st1\:*{behavior:url(#ieooui) } &lt;/style&gt; &lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal 	{mso-style-parent:&quot;&quot;; 	margin:0in; 	margin-bottom:.0001pt; 	mso-pagination:widow-orphan; 	font-size:12.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-fareast-font-family:&quot;Times New Roman&quot;;} p 	{mso-margin-top-alt:auto; 	margin-right:0in; 	mso-margin-bottom-alt:auto; 	margin-left:0in; 	mso-pagination:widow-orphan; 	font-size:12.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-fareast-font-family:&quot;Times New Roman&quot;;} @page Section1 	{size:8.5in 11.0in; 	margin:1.0in 1.25in 1.0in 1.25in; 	mso-header-margin:.5in; 	mso-footer-margin:.5in; 	mso-paper-source:0;} div.Section1 	{page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable 	{mso-style-name:&quot;Table Normal&quot;; 	mso-tstyle-rowband-size:0; 	mso-tstyle-colband-size:0; 	mso-style-noshow:yes; 	mso-style-parent:&quot;&quot;; 	mso-padding-alt:0in 5.4pt 0in 5.4pt; 	mso-para-margin:0in; 	mso-para-margin-bottom:.0001pt; 	mso-pagination:widow-orphan; 	font-size:10.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-ansi-language:#0400; 	mso-fareast-language:#0400; 	mso-bidi-language:#0400;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Transport Layer Aegis (TLS) and its predecessor, Defended Sockets Layer (SSL), are cryptographic protocols that accommodate defended communications on the Internet for such things as web browsing, e-mail, Internet faxing, burning messaging and added abstracts transfers. There are slight differences amid &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;and TLS, but the agreement charcoal about the same. The appellation &quot;TLS&quot; as acclimated actuality applies to both protocols unless antiseptic by context. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Description &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The TLS agreement allows applications to acquaint beyond a arrangement in a way advised to anticipate eavesdropping, tampering, and bulletin forgery. TLS provides endpoint affidavit and communications aloofness over the Internet appliance cryptography. Typically, alone the server is accurate (i.e., its character is ensured) while the applicant charcoal unauthenticated; this agency that the end user (whether an alone or an application, such as a Web browser) can be abiding with whom they are communicating. The abutting akin of security-in which both ends of the &quot;conversation&quot; are abiding with whom they are communicating-is accepted as alternate authentication. Alternate affidavit requires accessible key basement (PKI) deployment to audience unless TLS-PSK or TLS-SRP are used, which accommodate able alternate affidavit after defective to arrange a PKI. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TLS involves three basal phases: &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;1. Peer agreement for algorithm support&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;2. Accessible key barter and certificate-based authentication&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;3. Symmetric blank encryption &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;During the aboriginal phase, the applicant and server accommodate blank suites, which amalgamate one blank from anniversary of the following: &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Public-key cryptography: RSA, Diffie-Hellman, DSA&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Symmetric ciphers: RC2, RC4, IDEA, DES, Triple DES, AES or Camellia&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Cryptographic assortment function: MD2, MD4, MD5 or SHA &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;How it works &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A TLS applicant and server accommodate a stateful affiliation by appliance a handshaking procedure. During this handshake, the applicant and server accede on assorted ambit acclimated to authorize the connection&#39;s security. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The handshake begins aback a applicant connects to a TLS-enabled server requesting a defended connection, and presents a account of ciphers and assortment functions. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* From this list, the server picks the arch blank and assortment action that it additionally supports and notifies the applicant of the decision. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The server sends aback its identification in the anatomy of a agenda certificate. The affidavit will usually accommodate the server name, the trusted affidavit ascendancy (CA), and the server&#39;s accessible encryption key. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The applicant may acquaintance the server of the trusted CA and affirm that the affidavit is accurate afore proceeding. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* In adjustment to accomplish the affair keys acclimated for the defended connection, the applicant encrypts a accidental cardinal with the server&#39;s accessible key, and sends the aftereffect to the server. Alone the server can break it (with its clandestine key): this is the one actuality that makes the keys hidden from third parties, back alone the server and the applicant accept admission to this data. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Both parties accomplish key absolute for encryption and decryption. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;This concludes the handshake and begins the anchored connection, which is encrypted and decrypted with the key absolute until the affiliation closes. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;If any one of the aloft accomplish fails, the TLS handshake fails, and the affiliation is not created. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TLS Handshake in Detail &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The TLS agreement exchanges annal that abbreviate the abstracts to be exchanged. Anniversary almanac can be compressed, padded, added with a bulletin affidavit blank (MAC), or encrypted, all depending on the accompaniment of the connection. Anniversary almanac has a agreeable blazon acreage that specifies the record, a breadth field, and a TLS adaptation field. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;When the affiliation starts, the almanac encapsulates addition protocol, the handshake protocol, which has agreeable blazon 22. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A simple affiliation archetype follows: &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* A Applicant sends a ClientHello bulletin allegorical the accomplished TLS agreement adaptation it supports, a accidental number, a account of appropriate blank suites and compression methods. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The Server responds with a ServerHello, absolute the alleged agreement version, a accidental number, blank suite, and compression adjustment from the choices offered by the client. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The Server sends its Affidavit (depending on the alleged blank suite, this may be bare by the Server). &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;: These certificates are currently X.509, but there is additionally a abstract allegorical the use of OpenPGP based certificates. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The server may appeal a affidavit from the client, so that the affiliation can be mutually authenticated, appliance a CertificateRequest. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The Server sends a ServerHelloDone message, advertence it is done with handshake negotiation. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The Applicant responds with a ClientKeyExchange message, which may accommodate a PreMasterSecret, accessible key, or nothing. (Again, this depends on the alleged cipher.) &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The Applicant and Server again use the accidental numbers and PreMasterSecret to compute a accepted secret, alleged the &quot;master secret&quot;. All added key abstracts is acquired from this adept abstruse (and the client- and server-generated accidental values), which is anesthetized through a anxiously advised &quot;pseudorandom function&quot;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The Applicant now sends a ChangeCipherSpec message, about cogent the Server, &quot;Everything I acquaint you from now on will be encrypted.&quot; Note that the ChangeCipherSpec is itself a record-level protocol, and has blazon 20, and not 22. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Finally, the Applicant sends an encrypted Finished message, absolute a assortment and MAC over the antecedent handshake messages. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The Server will attack to break the Client&#39;s Finished message, and verify the assortment and MAC. If the decryption or analysis fails, the handshake is advised to accept bootless and the affiliation should be burst down. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Finally, the Server sends a ChangeCipherSpec and its encrypted Finished message, and the Applicant performs the aforementioned decryption and verification. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* At this point, the &quot;handshake&quot; is complete and the Appliance agreement is enabled, with agreeable blazon of 23. Appliance letters exchanged amid Applicant and Server will be encrypted. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Security &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TLS/&lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;accepts an array of aegis measures: &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The applicant may use the CA&#39;s accessible key to validate the CA&#39;s agenda signature on the server certificate. If the agenda signature can be verified, the applicant accepts the server affidavit as a accurate affidavit issued by a trusted CA.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The applicant verifies that the arising Affidavit Ascendancy (CA) is on its account of trusted CAs.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The applicant checks the server&#39;s affidavit ascendancy period. The affidavit action stops if the accepted date and time abatement alfresco of the ascendancy period.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* To assure adjoin Man-in-the-Middle attacks, the applicant compares the absolute DNS name of the server to the DNS name on the certificate. Browser-dependent, not authentic by TLS.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Aegis adjoin a decline of the agreement to a antecedent (less secure) adaptation or a weaker blank suite.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Numbering all the Appliance annal with an arrangement number, and appliance this arrangement cardinal in the MACs.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* Appliance a bulletin abstract added with a key (so alone a key-holder can analysis the MAC). This is authentic in RFC 2104. TLS only.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The bulletin that ends the handshake (&quot;Finished&quot;) sends a assortment of all the exchanged handshake letters apparent by both parties.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* The pseudorandom action splits the ascribe abstracts in bisected and processes anniversary one with a altered hashing algorithm (MD5 and SHA-1), again XORs them together. This provides aegis if one of these algorithms is begin to be vulnerable. TLS only.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;v3 bigger aloft &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;v2 by abacus SHA-1 based ciphers, and abutment for affidavit authentication. Additional improvements in &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;v3 accommodate bigger handshake agreement breeze and added attrition to man-in-the-middle attacks. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Applications &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TLS runs on layers below appliance protocols such as HTTP, FTP, SMTP, NNTP, and XMPP and aloft a reliable carriage protocol, TCP for example. While it can add aegis to any agreement that uses reliable access (such as TCP), it is best frequently acclimated with HTTP to anatomy HTTPS. HTTPS is acclimated to defended World Wide Web pages for applications such as cyberbanking business and asset management. SMTP is additionally a breadth in which TLS has been growing and is authentic in RFC 3207. These applications use accessible key certificates to verify the character of endpoints. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;An accretion cardinal of applicant and server articles abutment TLS natively, but abounding still abridgement support. As an alternative, users may ambition to use standalone TLS articles like Stunnel. Wrappers such as Stunnel await on actuality able to access a TLS affiliation immediately, by artlessly abutting to a abstracted anchorage aloof for the purpose. For example, by absence the TCP anchorage for HTTPS is 443, to analyze it from HTTP on anchorage 80. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TLS can additionally be acclimated to adit an absolute arrangement assemblage to actualize a VPN, as is the case with OpenVPN. Abounding vendors now ally TLS&#39;s encryption and affidavit capabilities with authorization. There has additionally been abundant development back the astern 1990s in creating applicant technology alfresco of the browser to accredit abutment for client/server applications. Aback compared adjoin acceptable IPsec VPN technologies, TLS has some inherent advantages in firewall and NAT bridge that accomplish it easier to administrate for ample remote-access populations. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TLS is additionally added actuality acclimated as the accepted adjustment for attention SIP appliance signaling. TLS can be acclimated to accommodate affidavit and encryption of the SIP signalling associated with VOIP (Voice over IP) and added SIP-based applications. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;History and development &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;agreement was originally developed by Netscape. Adaptation 1.0 was never about released; adaptation 2.0 was arise in 1994 but &quot;contained a cardinal of aegis flaws which ultimately led to the architecture of &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;adaptation 3.0&quot;, which was arise in 1996 (Rescorla 2001). This after served as the base for TLS adaptation 1.0, an IETF accepted agreement aboriginal authentic in RFC 2246 in January 1999. Visa, MasterCard, American Express and abounding arch banking institutions accept accustomed &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;for business over the Internet. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;operates in modular fashion. It is adaptable by design, with abutment for advanced and astern affinity and agreement amid peers. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Early abbreviate keys &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Some aboriginal implementations of &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;acclimated 40-bit symmetric keys because of US government restrictions on the consign of cryptographic technology. The &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;US&lt;/st1:place&gt;&lt;/st1:country-region&gt; government absolutely imposed a 40-bit keyspace, which was baby abundant to be burst by brute-force chase by law administration agencies adulatory to apprehend the encrypted traffic, while still presenting obstacles to less-well-funded attackers. A agnate limitation activated to Lotus Notes in consign versions. After several years of accessible controversy, a alternation of lawsuits, and closing US government acceptance of cryptographic articles with best key sizes produced alfresco the US, the authorities airy some aspects of the consign restrictions. The 40-bit key admeasurements limitation has mostly gone away, and avant-garde implementations use 128-bit (or longer) keys for symmetric key ciphers. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Standards &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The aboriginal analogue of TLS appeared in: &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 2246: &quot;The TLS Agreement Adaptation 1.0&quot;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The accepted accustomed adaptation is 1.1, which is authentic in &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 4346: &quot;The Carriage Layer Aegis (TLS) Agreement Adaptation 1.1&quot;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The abutting adaptation is proposed: &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC Abstract 4346 - The TLS Protocol, Adaptation 1.2 (published July 2007, expires January 2008) &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Other RFC after continued TLS, including: &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 2595: &quot;Using TLS with IMAP, POP3 and ACAP&quot;. Specifies an addendum to the IMAP, POP3 and ACAP casework that acquiesce the server and applicant to use transport-layer aegis to accommodate private, accurate advice over the Internet.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 2712: &quot;Addition of Kerberos Blank Suites to Carriage Layer Aegis (TLS)&quot;. The 40-bit cipher suites authentic in this announcement arise alone for the purpose of documenting the actuality that those cipher suite codes accept already been assigned.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 2817: &quot;Upgrading to TLS within HTTP/1.1&quot;, explains how to use the Upgrade apparatus in HTTP/1.1 to admit Carriage Layer Aegis (TLS) over an absolute TCP connection. This allows apart and anchored HTTP cartage to allotment the aforementioned able-bodied accepted anchorage (in this case, http: at 80 rather than https: at 443).&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 2818: &quot;HTTP Over TLS&quot;, distinguishes anchored cartage from afraid cartage by the use of a altered &#39;server port&#39;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 3207: &quot;SMTP Account Addendum for Defended SMTP over Carriage Layer Security&quot;. Specifies an addendum to the SMTP account that allows an SMTP server and applicant to use transport-layer aegis to accommodate private, accurate advice over the Internet.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 3268: &quot;AES Cipher suites for TLS&quot;. Adds Advanced Encryption Accepted (AES) ciphersuites to the ahead absolute symmetric ciphers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 3546: &quot;Transport Layer Aegis (TLS) Extensions&quot;, adds a apparatus for negotiating agreement extensions during affair initialisation and defines some extensions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 4132: &quot;Addition of Camellia Blank Suites to Carriage Layer Aegis (TLS)&quot;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 4162: &quot;Addition of SEED Blank Suites to Carriage Layer Aegis (TLS)&quot;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 4279: &quot;Pre-Shared Key Cipher suites for Carriage Layer Aegis (TLS)&quot;, adds three sets of new cipher suites for the TLS agreement to abutment affidavit based on pre-shared keys.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 4347: &quot;Datagram Carriage Layer Security&quot; specifies a TLS alternative that works over datagram protocols (such as UDP).&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 4366: &quot;Transport Layer Aegis (TLS) Extensions&quot; describes both a set of specific extensions, and a all-encompassing addendum mechanism.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;* RFC 4492: &quot;Elliptic Curve Cryptography (ECC) Blank Suites for Carriage Layer Aegis (TLS)&quot;. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Implementation &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Programmers may use the OpenSSL, NSS, or GnuTLS libraries for SSL/TLS functionality. Microsoft Windows includes an accomplishing of &lt;b style=&quot;&quot;&gt;SSL &lt;/b&gt;and TLS as allotment of its Defended Channel package. &lt;st1:place st=&quot;on&quot;&gt;Delphi&lt;/st1:place&gt; programmers may use a library alleged Indy. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;TLS 1.1 &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As acclaimed above, TLS 1.1 is the accepted accustomed adaptation of the TLS protocol. TLS 1.1 clarifies some ambiguities and adds a cardinal of recommendations, but charcoal actual agnate to TLS 1.0. An abounding account of differences is provided in RFC 4346 (Section 1.1). &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Certificate providers &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A 2005 Netcraft analysis bent that VeriSign and its acquisitions such as Thawte accept a 53% allotment of the affidavit ascendancy market, followed by GeoTrust (25%), Comodo (12%), GoDaddy (4%) and Entrust (2%). (GeoTrust has back been acquired by VeriSign.) &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;A added contempo bazaar allotment address from Aegis Space as of April 2007 bent that VeriSign and its acquisitions (including GeoTrust) accept a 59.6% allotment of the affidavit ascendancy market, followed by Comodo (8.3%), GoDaddy (5.3%), DigiCert (2.1%), Entrust (1.3%) and Arrangement Solutions (1.1%). &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;CAcert.org is a community-driven affidavit ascendancy that issues chargeless accessible key certificates.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot; class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  </description><link>http://sslwebhosting.blogspot.com/2009/07/web-hosting-term-ssl-certificate-ssl.html</link><author>noreply@blogger.com (neko19)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-149816378162775924.post-6223759474786773755</guid><pubDate>Fri, 31 Jul 2009 02:43:00 +0000</pubDate><atom:updated>2009-07-31T10:45:57.515+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ssl</category><category domain="http://www.blogger.com/atom/ns#">ssl certificates</category><category domain="http://www.blogger.com/atom/ns#">what is ssl</category><title>Force SSL/https using .htaccess and mod_rewrite (SSL Web Hosting)</title><description>Sometimes you may charge to accomplish abiding that the user is browsing your armpit over securte connection. An accessible to way to consistently alter the user to defended affiliation (https://) can be able with a .htaccess book absolute the afterward lines:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;RewriteEngine On&lt;br /&gt;&lt;br /&gt;RewriteCond %{SERVER_PORT} 80&lt;br /&gt;&lt;br /&gt;RewriteRule ^(.*)$ https://www.example.com/$1 [R,L]&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Please, note that the .htaccess should be amid in the web armpit capital folder.&lt;br /&gt;&lt;br /&gt;In case you ambition to force HTTPS for a accurate binder you can use:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;RewriteEngine On&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;RewriteCond %{SERVER_PORT} 80&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;RewriteCond %{REQUEST_URI} somefolder&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;RewriteRule ^(.*)$ https://www.domain.com/somefolder/$1 [R,L]&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The .htaccess book should be placed in the binder area you charge to force HTTPS.</description><link>http://sslwebhosting.blogspot.com/2009/07/force-sslhttps-using-htaccess-and.html</link><author>noreply@blogger.com (neko19)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-149816378162775924.post-8864301151749600668</guid><pubDate>Fri, 31 Jul 2009 01:38:00 +0000</pubDate><atom:updated>2009-07-31T09:50:23.903+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ssl</category><category domain="http://www.blogger.com/atom/ns#">ssl certificate</category><category domain="http://www.blogger.com/atom/ns#">ssl certificates</category><category domain="http://www.blogger.com/atom/ns#">ssl proxy</category><category domain="http://www.blogger.com/atom/ns#">ssl web hosting</category><category domain="http://www.blogger.com/atom/ns#">what is ssl</category><title>Web Hosting Basics: Extended Validation SSL Certificates (SSL web hosting)</title><description>&lt;meta equiv=&quot;Content-Type&quot; content=&quot;text/html; charset=utf-8&quot;&gt;&lt;meta name=&quot;ProgId&quot; content=&quot;Word.Document&quot;&gt;&lt;meta name=&quot;Generator&quot; content=&quot;Microsoft Word 11&quot;&gt;&lt;meta name=&quot;Originator&quot; content=&quot;Microsoft Word 11&quot;&gt;&lt;link rel=&quot;File-List&quot; href=&quot;file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml&quot;&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; latentstylecount=&quot;156&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal 	{mso-style-parent:&quot;&quot;; 	margin:0in; 	margin-bottom:.0001pt; 	mso-pagination:widow-orphan; 	font-size:12.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-fareast-font-family:&quot;Times New Roman&quot;;} p 	{mso-margin-top-alt:auto; 	margin-right:0in; 	mso-margin-bottom-alt:auto; 	margin-left:0in; 	mso-pagination:widow-orphan; 	font-size:12.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-fareast-font-family:&quot;Times New Roman&quot;;} @page Section1 	{size:8.5in 11.0in; 	margin:1.0in 1.25in 1.0in 1.25in; 	mso-header-margin:.5in; 	mso-footer-margin:.5in; 	mso-paper-source:0;} div.Section1 	{page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable 	{mso-style-name:&quot;Table Normal&quot;; 	mso-tstyle-rowband-size:0; 	mso-tstyle-colband-size:0; 	mso-style-noshow:yes; 	mso-style-parent:&quot;&quot;; 	mso-padding-alt:0in 5.4pt 0in 5.4pt; 	mso-para-margin:0in; 	mso-para-margin-bottom:.0001pt; 	mso-pagination:widow-orphan; 	font-size:10.0pt; 	font-family:&quot;Times New Roman&quot;; 	mso-ansi-language:#0400; 	mso-fareast-language:#0400; 	mso-bidi-language:#0400;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;In 2005, an accumulation of arch acceptance authorities (CAs) and Internet browsers came calm to authorize a added accurate and harmonized access to online &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt; security. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;Known as the CA/Browser Forum, the accumulation absitively a connected Secure Socket Layer (&lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt;) adjustment was needed, to prove a website’s actuality above all browsers, for all CAs and for all Web users. In January 2007, new Extended Validation (EV) &lt;b style=&quot;&quot;&gt;SSL certificates&lt;/b&gt; were at aftermost appears worldwide, and is accepted to abundantly enhance ecommerce and addition the aplomb of online shoppers everywhere. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;Wayne Thayer, Vice President of Development for GoDaddy – an apple arch &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt; Web hosting provider, area agent and above affiliate of the CA/Browser Appointment – told TopHosts that the aim of EV &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt; is to accommodate an abundant needed, constant way of ensuring angary online. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;“There were a cardinal of above players that acquainted we bare to actualize some array of accepted we could accompany to the marketplace,” Thayer said. “An affidavit that meant the aforementioned affair no amount area you bought it from.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;Up until the barrage of EV &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt;, Thayer explained abounding differing levels of &lt;b style=&quot;&quot;&gt;SSL certificates&lt;/b&gt; could be obtained, but none absolutely activity above WebTrust – a allowance awarded to sites that attach to assertive business standards. Abounding altered types of SSLs, like GoDaddy’s Turbo &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt; and High-Assurance &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt;, for example, accommodate abundant aegis and online assurance, but may not accept by the aforementioned rules and regulations of added CAs and Web hosting providers. There is artlessly no accord amid them, and they don’t abode growing apropos phishing, an anatomy of Internet artifice that aims to abduct admired advice such as acclaim cards, SSNs, IDs and passwords, through affected websites. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;With EV SSLs, all CAs charge attach to the aforementioned aegis standards back processing affidavit requests, while visitors to EV &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt;-secured sites can assurance that the online alignment has undergone the aforementioned accepted affidavit process. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;“The EV vetting action creates an absolute able tie amid the alignment that is called in the affidavit and the absolute apple organization,” Thayer said. “… EV &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt; has a cardinal of added accomplish that accomplish it abundant added difficult for fraudsters to accomplish phishing and pretend they’re article they’re not.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;The CA/Browser appointment outlines a new EV &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt; vetting process, which validates elements such as, the acknowledged actuality of the site, the acknowledged name of the entity, a allotment number, appropriate to use the area name, forth with added acknowledged indications. To administer for an EV &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt;, the business charge present a letter from an advocate or an accountant. The action verifies the organization’s identity, the authority of the appeal and the all-embracing angary of the business. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;Unlike the accepted padlock figure adjustment acclimated for all added &lt;b style=&quot;&quot;&gt;SSL&lt;/b&gt; &lt;b style=&quot;&quot;&gt;certificates&lt;/b&gt;, browsers with EV abutment will affectation a blooming abode bar and a appropriate label, which names the website buyer and the CA that issued their certificate. This beheld apparatus is abnormally advantageous for domains advised to be a high-risk ambition of phishing and added artifice schemes. Banking sites, bargain sites, retailers and added banking casework can bigger acquaint their angary to users, acceptance visitors to affirm that any online advice they advance is safe and adequate by EV. &lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: justify;&quot;&gt;Currently, alone Internet Explorer 7 and Opera 8 browsers are EV-ready and abutment the new beheld indicators. Mozilla and Safari are accepted to be committed to acknowledging the abstraction of EV, with Firefox accepted to apparatus it in their version-3 release.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;  </description><link>http://sslwebhosting.blogspot.com/2009/07/web-hosting-basics-extended-validation.html</link><author>noreply@blogger.com (neko19)</author><thr:total>0</thr:total></item></channel></rss>