![]() SSLCertificateKeyFile /etc/httpd/conf/ssl.crt/server.key SSLCertificateFile /etc/httpd/conf/ssl.crt/server.crt SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL At time of writing, versions 7.3.2 and earlier did not support this feature.Īn example Apache configuration for this might be: Note: Users of the old Slimserver software may be expecting that they can tunnel /slimserver/ or /squeezecenter/, and so would not have to run an entire virtual host for Squeezecenter. Basic Authentication does not have any protection for brute force password guessing, so ensure the username and password you use is different from any other on your system. This will cause your browser to prompt for a username and password in order to access the SSL proxy service. Optionally (but most recommended) protect your site with Basic HTTP Authentication.This must proxy all requests to "/" on your server to Configure a proxy to run on your web server.In most cases this can be a self-signed certificate, or otherwise buy one from a certificate provider. You will need to generate an SSL certificate for this to work. Configure SSL for your web server so that responds correctly.Ideally, this will be the same machine as Squeezecenter, although does not have to be. First, setup an Apache (or possibly IIS) web server on a machine on your home network.That said, it's probably a better solution than opening up port 9000 on your server (as described above). ![]() This approach has security risks associated with it, which you should understand fully before attempting to use it. It can only be attempted in situations where you have good control of your home network and your Internet connection. This is a more advanced solution, and not one for the beginner.
0 Comments
Leave a Reply. |