Mildis
2018-12-03 21:18:43 UTC
Hi,
I'm using 1.8.14 and I tried to follow https://www.haproxy.com/blog/serving-ecc-and-rsa-certificates-on-same-ip-with-haproxy/ <https://www.haproxy.com/blog/serving-ecc-and-rsa-certificates-on-same-ip-with-haproxy/> but all I'm getting in the log is
ssl-relay ssl-rsa/rsa 1/-1/0 0 SC 1/1/0/0/3 0/0
Currently I do not have an ECC cert so I'm doing tests with an RSA only backend
The relevant configuration is
frontend ssl-relay
mode tcp
bind ${HAPROXY_VRRP}:443
bind ${HAPROXY_IPV4}:443
bind ${HAPROXY_IPV6}:443
default_backend ssl-rsa
backend ssl-rsa
mode tcp
server rsa unix@/var/run/haproxy/haproxy_ssl_rsa.sock send-proxy-v2
listen all-ssl
mode http
bind unix@/var/run/haproxy/haproxy_ssl_rsa.sock accept-proxy ssl crt company.crt
# capture request header Host len 50
# capture response header Location len 50
# capture request header User-Agent len 50
http-request set-header X-Forwarded-Proto https
http-request set-header X-Forwarded-Port 443
http-request set-header X-Forwarded-Host %[ssl_fc_sni]
http-response set-header Strict-Transport-Security max-age=31536000;\ includeSubDomains
acl secured_cookie res.hdr(Set-Cookie),lower -m sub secure
rspirep ^(Set-Cookie:.*) \1;\ Secure unless secured_cookie
The all-ssl section is where all the routing logic take place based on hdr(host) and path_beg combinations to use a specific backend.
Why is SC the only answer ?
Am I missing something ?
Thanks,
Mildis
I'm using 1.8.14 and I tried to follow https://www.haproxy.com/blog/serving-ecc-and-rsa-certificates-on-same-ip-with-haproxy/ <https://www.haproxy.com/blog/serving-ecc-and-rsa-certificates-on-same-ip-with-haproxy/> but all I'm getting in the log is
ssl-relay ssl-rsa/rsa 1/-1/0 0 SC 1/1/0/0/3 0/0
Currently I do not have an ECC cert so I'm doing tests with an RSA only backend
The relevant configuration is
frontend ssl-relay
mode tcp
bind ${HAPROXY_VRRP}:443
bind ${HAPROXY_IPV4}:443
bind ${HAPROXY_IPV6}:443
default_backend ssl-rsa
backend ssl-rsa
mode tcp
server rsa unix@/var/run/haproxy/haproxy_ssl_rsa.sock send-proxy-v2
listen all-ssl
mode http
bind unix@/var/run/haproxy/haproxy_ssl_rsa.sock accept-proxy ssl crt company.crt
# capture request header Host len 50
# capture response header Location len 50
# capture request header User-Agent len 50
http-request set-header X-Forwarded-Proto https
http-request set-header X-Forwarded-Port 443
http-request set-header X-Forwarded-Host %[ssl_fc_sni]
http-response set-header Strict-Transport-Security max-age=31536000;\ includeSubDomains
acl secured_cookie res.hdr(Set-Cookie),lower -m sub secure
rspirep ^(Set-Cookie:.*) \1;\ Secure unless secured_cookie
The all-ssl section is where all the routing logic take place based on hdr(host) and path_beg combinations to use a specific backend.
Why is SC the only answer ?
Am I missing something ?
Thanks,
Mildis