From owner-freebsd-chat Tue Dec 16 21:20:16 1997 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.7/8.8.7) id VAA10175 for chat-outgoing; Tue, 16 Dec 1997 21:20:16 -0800 (PST) (envelope-from owner-freebsd-chat@FreeBSD.ORG) Received: from misery.sdf.com (misery.sdf.com [204.244.210.193]) by hub.freebsd.org (8.8.7/8.8.7) with SMTP id VAA10138; Tue, 16 Dec 1997 21:20:05 -0800 (PST) (envelope-from tom@sdf.com) Received: from tom by misery.sdf.com with smtp (Exim 1.73 #1) id 0xiBia-0001Pr-00; Tue, 16 Dec 1997 21:08:24 -0800 Date: Tue, 16 Dec 1997 21:08:24 -0800 (PST) From: Tom To: Charles Mott cc: chat@FreeBSD.ORG, softweyr@xmission.com, hackers@FreeBSD.ORG, isp@FreeBSD.ORG Subject: Re: Support for secure http protocols In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-chat@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Tue, 16 Dec 1997, Charles Mott wrote: > "anonymous" ssh server on the web server, and then have the client Except that this does not deal with authentication. This is what the SSL certificate system does for you. Suggestion? Go SSL. It is standard now. It can be used for many protocols, as it can encapsulate nearly socket type date (stands for "secure sockets layer"). You can get apache-ssl from ports. Get a certificate from a certificate granting authority (ex. Verisign), and your done. Works with all standard browser now. Tom