Re: Haproxy+Nginx SSL Insecurities

2010-11-02 Thread Willy Tarreau
On Tue, Nov 02, 2010 at 05:40:48PM -0400, John T Skarbek wrote: > I'm going to assume yes, mine looks a little different (PRNN vs PR--)most > likely due to the fact I'm not sending cookies in this test setup, here's > what I log each time I hit the site without SSL: > > Nov 2 17:32:51 whoopsie ha

Re: Haproxy+Nginx SSL Insecurities

2010-11-02 Thread John T Skarbek
I'm going to assume yes, mine looks a little different (PRNN vs PR--)most likely due to the fact I'm not sending cookies in this test setup, here's what I log each time I hit the site without SSL: Nov 2 17:32:51 whoopsie haproxy[3540]: :33058 [02/Nov/2010:17:32:51.527] site0 site0/ 1/-1/-1/-1/1 3

Re: Haproxy+Nginx SSL Insecurities

2010-11-02 Thread Guillaume Bourque
Hi John and the list, Thanks for sharing your config I have a similar one and it work's BUT In the haprosy log file I get one log entry with flag PR when I hit the SSL site with port 80 Nov 2 17:09:39 localhost haproxy[10021]: 1.1.1.1:1680[02/Nov/2010:17:09:39.246] DISPATCH-lb2 DISPATCH-lb2/ 4/

Re: Haproxy+Nginx SSL Insecurities

2010-07-08 Thread John T Skarbek
Hey guys, Thanks for the input. I ended up settling on the following configuration type: in haproxy: listen something.com bind 172.168.1.1:80 acl acl_port_80 dst_port eq 80 acl acl_secure hdr(amISecure) YES cookie SERVERID insert indirect nocache redirect

Re: Haproxy+Nginx SSL Insecurities

2010-07-03 Thread Willy Tarreau
On Sat, Jul 03, 2010 at 11:23:16AM -0400, John T Skarbek wrote: > Chris, > > Thanks for responding. I had thought of the option you mention. However I > discontinued it quickly. The reason I'm not a big fan, is that those header > values can be hacked quite easily. Granted the end user (hacker

Re: Haproxy+Nginx SSL Insecurities

2010-07-03 Thread XANi
Ive done something similar (dont remmber config details now, sorry), basically lighttpd was used as frontend for both http and https traffic (i used it for compressing too) it: 1.Removed header called "SSL" 2. Added "SSL: Yes" So even if someone sends evil headers they will get removed or u can p

Re: Haproxy+Nginx SSL Insecurities

2010-07-03 Thread Harvey Yau
On 7/3/10 9:51 AM, John T Skarbek wrote: Good Morning, I'm testing out a solution to use nginx for ssl decryption to pass off requests to haproxy. During the thought process of everything, and later during testing, I noticed that all I'd need to do in the clients web browser is to simply ta

Re: Haproxy+Nginx SSL Insecurities

2010-07-03 Thread John T Skarbek
Chris, Thanks for responding. I had thought of the option you mention. However I discontinued it quickly. The reason I'm not a big fan, is that those header values can be hacked quite easily. Granted the end user (hacker) may not know the specific value that must hold. There are even plugins

Re: Haproxy+Nginx SSL Insecurities

2010-07-03 Thread Chris Sarginson
On 3 Jul 2010, at 14:51, John T Skarbek wrote: > Good Morning, > > I'm testing out a solution to use nginx for ssl decryption to pass off > requests to haproxy. During the thought process of everything, and later > during testing, I noticed that all I'd need to do in the clients web browser

Haproxy+Nginx SSL Insecurities

2010-07-03 Thread John T Skarbek
Good Morning, I'm testing out a solution to use nginx for ssl decryption to pass off requests to haproxy. During the thought process of everything, and later during testing, I noticed that all I'd need to do in the clients web browser is to simply take out the 's' on 'https' and all traffic will