Amazon ec2 www和http在AWS中起作用,但https不起作用
我正在尝试部署一个部署在80端口的web应用程序,我可以从www.ajaykalkoti.space和访问该网站 如果我尝试访问,它返回403错误。请求无法满足。我在路线53中的条目应该是什么。我附上了以下条目的屏幕截图 我没有使用负载平衡器,因为我想它会被收费 请引导我Amazon ec2 www和http在AWS中起作用,但https不起作用,amazon-ec2,amazon-cloudfront,Amazon Ec2,Amazon Cloudfront,我正在尝试部署一个部署在80端口的web应用程序,我可以从www.ajaykalkoti.space和访问该网站 如果我尝试访问,它返回403错误。请求无法满足。我在路线53中的条目应该是什么。我附上了以下条目的屏幕截图 我没有使用负载平衡器,因为我想它会被收费 请引导我 53号干线表格 唱片 使用本AWS指南: 您应该在/etc/httpd/conf.d/ssl.conf中配置443端口: Listen 443 <VirtualHost *:443> ServerNam
53号干线表格
唱片 使用本AWS指南: 您应该在/etc/httpd/conf.d/ssl.conf中配置443端口:
Listen 443
<VirtualHost *:443>
ServerName ajaykalkoti.space
ErrorLog /var/log/httpd/ssl.error.log
CustomLog /var/log/httpd/ssl.log combined
SSLEngine on
SSLCertificateFile PATH_TO_CERT.crt
SSLCertificateKeyFile PATH_TO_KEY.key
SSLCertificateChainFile PATH_TO_CHAIN.ca-bundle
SSLProtocol -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2
SSLProxyProtocol -SSLv2 -SSLv3 -TLSv1 -TLSv1.1 +TLSv1.2
SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
SSLProxyCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
ProxyPreserveHost On
ProxyPass / http://localhost:8080/
ProxyPassReverse / http://localhost:8080/
</VirtualHost>
听443
服务器名ajaykalkoti.space
ErrorLog/var/log/httpd/ssl.error.log
CustomLog/var/log/httpd/ssl.log组合
斯伦金安
SSLCertificateFile路径\u到\u CERT.crt
SSLCertificateKeyFile路径_到_KEY.KEY
SSLCertificateChainFile路径\u到\u CHAIN.ca-bundle
SSLProtocol-SSLv2-SSLv3-TLSv1-TLSv1.1+TLSv1.2
SSLProxyProtocol-SSLv2-SSLv3-TLSv1-TLSv1.1+TLSv1.2
SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA256:!阿努尔:!埃努尔:!出口:!德斯:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
SSLProxyCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA256:!阿努尔:!埃努尔:!出口:!德斯:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
代理主机
ProxyPass/http://localhost:8080/
ProxyPassReverse/http://localhost:8080/
举例来说
并在实例安全组中启用443端口您是否绝对确定您正在运行HTTPS服务器?你真的在80端口上运行它吗?为什么不在端口443上,HTTPS的标准端口?如果您在端口80上运行它,为什么要在端口443上访问它?我正在运行一个Spring Boot应用程序,是否需要让它在443上运行?