Am 07.01.2017 um 17:04 schrieb Jered Floyd:
Does the "sslheaders" experimental plugin meet your needs?

https://docs.trafficserver.apache.org/en/latest/admin-guide/plugins/sslheaders.en.html

not really beause it's not transparent to the application and so i can continue fake the $_SERVER vars based on application configs - it also needs to make sure that this headers never ever are passed through from untrusted amchines in front fo the own proxy or faked by clients pointing directly to the origin - the way mod_remoteip works takes cae of such things

"end-to-end" don't matter when both ATS and httpd are on the same switch or even running on the same vritualization host - what matters much more is that your applications is aware about the https fact and set the *encryption flag for cookies* as example

the fake-by-configuration hacking makes things just more complex because you have one more place to care besides DNS, ATS and httpd and the Magento hacks placing $_SERVER['xyz'] into 'index.php' are anything but not beautiful

well, and for sites which should be reachable with https *and* http you can forget this entirely when don't have any clue

----- On Jan 7, 2017, at 3:30 AM, Reindl Harald h.rei...@thelounge.net wrote:

* Apache Trafficserver in front
* ATS configured for TLS-offloading
* connection to backend-httpd on the LAN unencrypted
* mod_remoteip correctly configured on backend httpd

is there any way to make the backend php application aware that in fact
$_SERVER['HTTPS'] and $_SERVER['REQUEST_SCHEME'] should be 'on' /
https:// in case of generate absolute URLs like for emails

in a perfect world this would be handeled like the transparent
translation of the client IP with
https://httpd.apache.org/docs/current/mod/mod_remoteip.html and it's
RemoteIPInternalProxy and a header like "X-Forwarded-TLS"

something like below where "X-TLS-Offloading" is only evaluated from
"RemoteIPInternalProxy" pyhsical addressess

RemoteIPHeader         X-Forwarded-For
RemoteTLSHeader        X-TLS-Offloading
RemoteIPInternalProxy  192.168.196.1

Reply via email to