Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Trouble actually hitting the correct applet from external connection

    Scheduled Pinned Locked Moved Cache/Proxy
    52 Posts 2 Posters 7.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      menethoran @johnpoz
      last edited by

      @johnpoz i wasnt trying to set up my backend (or front end for that matter) not to use SSL, i want ssl from start to finish with this one (again, ombi i dont care about as you cant use ssl... nextcloud is a bit different, and I definitely want SSL. I have ticked and unticked the (Encrypt)SSL and SSL checks. but neither seems to have any impact.

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @menethoran
        last edited by johnpoz

        @menethoran your backend has to be set to use ssl if your going to use ssl with it.. And your frontend needs to be setup as ssl as well, etc.

        I don't have anything setup that way.. Let me find something I can run through haproxy that would use a acme cert on the backend. Truenas cert doesn't seem correct and why would haproxy trust some selfsigned cert, etc.

        edit: have a look around here for that question, I know its come up for ssl on the backend.. Here is one I found
        https://forum.netgate.com/topic/142748/haproxy-ssl-mode-help-needed

        "Either add certificates and offloading to the haproxy frontend, or use ssl/tcp mode and use SNI for the webserver selection.. As the Host-header is not available when passing SSL along as-is."

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        M 1 Reply Last reply Reply Quote 0
        • M
          menethoran @johnpoz
          last edited by

          @johnpoz honestly, i should have had WAY more experience with this stuff before getting this deep into it... so, i dont know.

          It almost seems as if something is broken in the middle. Like, it seems to be coming into the network with SSL, gets forwarded almost correctly but (im guessing nginx) does something weird (im guessing nginx as thats what TrueNAS uses) and sends me almost like im going to an unsecured site. I see the https: corss out on the browser, and looking at the cert, it definitely isnt one ive ever created...

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @menethoran
            last edited by johnpoz

            @menethoran read the thread I linked to @PiBa is the resident guru of guru's when it comes to HAproxy..

            With my page of him, maybe he will drop by and smack some of his wisdom down..

            BTW - going to move this to the proxy section..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            M 1 Reply Last reply Reply Quote 0
            • johnpozJ johnpoz moved this topic from Firewalling on
            • M
              menethoran @johnpoz
              last edited by

              @johnpoz sounds good!

              Yeah, im already using real certificates (which looks like that was part of the problem in the other thread...)

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @menethoran
                last edited by

                @menethoran take note of not being able to pass it thru really directly, etc.

                None of the stuff I have hosted with haproxy used ssl on the backend, I always just did the ssl offloaded to the frontend..

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                M 1 Reply Last reply Reply Quote 0
                • M
                  menethoran @johnpoz
                  last edited by

                  @johnpoz
                  OK, maybe im making this WAY more complicated than i need to. Once the traffic hits my network, i dont "really" care how secure it is as long as its encrypted coming in and going out. Can I in theory, just drop the SSL handling of the backend and leave it on the frontend? Or do i need the backend to have SLL because I have it set for SSL offloading?

                  johnpozJ 1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator @menethoran
                    last edited by

                    @menethoran the only issue, is I think nextcloud is pretty strict on wanting to use ssl. But sure if you can get it to load locally without ssl just by going to http://IPaddress:port then you could do whatever offloading you want on the front in haproxy.

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    M 2 Replies Last reply Reply Quote 0
                    • M
                      menethoran @johnpoz
                      last edited by

                      @johnpoz actually, thats just it... I CANT hit it locally with HTTP, only HTTPS...

                      johnpozJ 1 Reply Last reply Reply Quote 0
                      • M
                        menethoran @johnpoz
                        last edited by

                        @johnpoz potrisk.jpg ![weird.jpg](/assets/uploads/files/1641936343948-weird-resizebadrequest.jpg d.jpg)

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @menethoran
                          last edited by johnpoz

                          @menethoran Then you have to setup haproxy frontent and backend using ssl, or you need to change nextcloud to only use http..

                          That is selfsigned cert, change it to use an acme cert on the nextcloud box.. Or I think there was a thread around here getting haproxy to use backend self signed certs?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          M 2 Replies Last reply Reply Quote 0
                          • M
                            menethoran @johnpoz
                            last edited by

                            @johnpoz honestly, im starting to think i need to go over to the TrueNAS guys and ask them why this whole thing is picking up their cert... I mean, i get that theres something wonky going on... and theres a good chance that part of it heavily involves PfSense, but i feel like maybe i dont understand (or we dont) how TrueNAS is handling the incoming traffic.

                            That make sense or am i grasping at straws here?

                            (And FYI: I refuse to run Nextcloud over a non-secured connection... not that you were telling me to go that direction, just letting you know where i stand)

                            1 Reply Last reply Reply Quote 0
                            • M
                              menethoran @johnpoz
                              last edited by

                              @johnpoz also, i would prefer to avoid self-signed certs if at all possible...

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @menethoran
                                last edited by

                                @menethoran said in Trouble actually hitting the correct applet from external connection:

                                i would prefer to avoid self-signed certs if at all possible...

                                Completely agree - I wouldn't use them, especially when pfsense makes it so easy to create your own CA and create any certs you want and have your browsers trust them. All of my services that use ssl are signed by my home ca, and my browser trusts them. Printer gui, switches gui, my unifi controler, my nas, etc..

                                And they all have san entries for just the IPs they use, so can access them via fqdn (without having to be a public domain) or just their IP.

                                And since these were created before browsers when with like the year limits, these certs are good for 10 years ;)

                                goodtil.jpg

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                M 1 Reply Last reply Reply Quote 0
                                • M
                                  menethoran @johnpoz
                                  last edited by

                                  @johnpoz So, strike my previous comment. It looks like the nginx message is actually created by PfSense (i get the same message if i try to connect PfSense with a forced HTTPS that originates as an HTTP connection

                                  What I dont understand is why? SM i missing something in my settings (frontend/backend) that is causing PfSense to think im trying to connect with an insecure connection?

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.