Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SSL certs handling and HAproxy

    Scheduled Pinned Locked Moved General pfSense Questions
    136 Posts 3 Posters 30.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      lewis
      last edited by lewis

      @stephenw10 said in SSL certs handling and HAproxy:

      Make sure there are firewall pass rules to allow the incoming traffic to access HAProxy.

      Wait, do you mean some other kind of rule and not NAT rule?

      Check the HAProxy status to see what's happening.

      What am I looking for here, there's a lot of information.

      kiokomanK 1 Reply Last reply Reply Quote 0
      • L
        lewis
        last edited by

        I was going to edit the previous but my extra notes might be missed.

        Yes, I do see haproxy status page.
        I also notice that other than many columns, there's little data in there which makes me think haproxy is in fact being bypassed.
        I'm not sure what part of that page would be useful to share.

        1 Reply Last reply Reply Quote 0
        • kiokomanK
          kiokoman LAYER 8 @lewis
          last edited by

          @lewis
          normal firewall rules on WAN. not a NAT
          destination should be "this firewall (self)" if you want haproxy to intercept the traffic
          like my print screen
          ae8202be-8c56-44f5-95fc-717ccc35670b-image.png

          ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
          Please do not use chat/PM to ask for help
          we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
          Don't forget to Upvote with the 👍 button for any post you find to be helpful.

          1 Reply Last reply Reply Quote 0
          • L
            lewis
            last edited by lewis

            Ok, to be sure I don't screw anything up here.
            I do see the NAT firewall rule I created in the WAN view as well.
            You're saying I need to remove the rule from the NAT view then add it back into the WAN view and make it self which would make sense.
            The difference in your rule and my setup would be that I'm using one of the VIPs so would need to configure that as the incoming WAN IP.

            I think source will be any and destination will be self as you said which is when HAProxy takes over since it knows the VIP it needs to monitor for.

            1 Reply Last reply Reply Quote 0
            • L
              lewis
              last edited by

              I'm wrong in my assumption in the last comment because I have multiple VIPs.

              kiokomanK 1 Reply Last reply Reply Quote 0
              • kiokomanK
                kiokoman LAYER 8 @lewis
                last edited by kiokoman

                @lewis
                i'm not sure on this but maybe destination could be your vip address or the alias with the vip addresses, i never had the need to have 2 different configuration so i'm always putting "this firewall" as destination
                also i'm always configuring my backend on port 80, without self signed cert and stuff, i trust my own network so i don't need this kind of complexity

                ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                Please do not use chat/PM to ask for help
                we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                1 Reply Last reply Reply Quote 0
                • L
                  lewis
                  last edited by

                  I don't see any options for adding a VIP in destination.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yes the destination on the pass rule should be the VIP. It would work fine using 'This Firewall' but best practice there is to make a rule as precise as possible.

                    1 Reply Last reply Reply Quote 0
                    • L
                      lewis
                      last edited by

                      Can someone share the specifics of this rule?

                      I'll test the single server first, and if that works, I'll then tackle the three web servers I've talked about.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        It should looks something like:
                        Screenshot from 2023-12-19 20-50-08.png

                        Where 172.21.18.1 is the VIP.

                        1 Reply Last reply Reply Quote 0
                        • L
                          lewis
                          last edited by

                          There is nothing in the rule creation page that offers any way of selecting a VIP.
                          Do I have to create another alias, just so I can use 'other'?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Just select 'Address or Alias' and enter the IP.

                            1 Reply Last reply Reply Quote 0
                            • L
                              lewis
                              last edited by lewis

                              This post is deleted!
                              1 Reply Last reply Reply Quote 0
                              • L
                                lewis
                                last edited by lewis

                                So here's my WAN rule;
                                wan-rule.png

                                I seem to be reaching the firewall now but not the site. I say that because testing the SSL cert is now showing the days left of the cert on pfsense instead of the one on the web server.

                                I'm getting a
                                "Browser detected a potential security threat and did not continue to www.aaa.com because this website requires a secure connection"
                                No traffic is getting to the web server. I'm guessing that's the mess in the haproxy setup now.

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  It's because by default the pfSense GUI listens on those ports. If you have not already you will need to change the port that runs on:
                                  https://docs.netgate.com/pfsense/en/latest/config/advanced-admin.html#tcp-port

                                  And disable the webgui redirect rule there if you want to be able to connect on port 80 to HAProxy too.

                                  1 Reply Last reply Reply Quote 0
                                  • L
                                    lewis
                                    last edited by

                                    I don't use standard ports for the GUI so that's not a problem.
                                    I do however, have those standard ports in use on the primary IP which is why I'm using VIPs for web servers.

                                    Maybe I'm missing something in what you're saying?

                                    1 Reply Last reply Reply Quote 0
                                    • L
                                      lewis
                                      last edited by

                                      BTW, I do now see Byes in and out in the haproxy status page for that web server.
                                      Which also seems to confirm that the load balancing has never actually worked, even if some part of it definitely does.

                                      1 Reply Last reply Reply Quote 0
                                      • L
                                        lewis
                                        last edited by

                                        I might be close now.

                                        I'm using a remote browser and I'm getting this;

                                        has a security policy called HTTP Strict Transport Security (HSTS), which means that Tor Browser can only connect to it securely.
                                        You can’t add an exception to visit this site.
                                        The issue is most likely with the website, and there is nothing you can do to resolve it.

                                        I've disabled HSTS on the web server but still getting the warning.
                                        Maybe now I have to look at the server but no one has answered some of the questions I've asked about the server.

                                        I've asked about how SSL should be set up on the server and especially if it's one that has virtualhosts.

                                        Some talk about a self signed cert and some don't.

                                        1 Reply Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          Can you connect using https? You are connecting to HAProxy so policy changes would have to be there. If you wanted to allow http connections which you probably don't. More likely you would add a redircet rule in HAProxy to redirect http requests to https.
                                          But I would get it working using https directly first.

                                          1 Reply Last reply Reply Quote 0
                                          • L
                                            lewis
                                            last edited by

                                            Just for giggles, I swapped out the rule from NAT to WAN for the web servers and again, the traffic to each web server just died.
                                            wan-rule.png
                                            I had to re-anable the NAT rule again.

                                            Back to the single server I was testing, no, I cannot connect to it using http or https.

                                            stephenw10S 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.