Hi !

Cookie based forwarding to the matching backend server using haproxy works 
fine. SSL sessions should be decrypted by stunnel and then forwarded to haproxy 
for cookie based forwarding. But this didn't happen. Due to an not permitted 
operation the SSL connect would be closed.

the carp interfaces belong to loopback ?! should they not belong to the WAN 
interface ? 


stunnel log :

LOG5[15140:675287104]: stunnel 4.25 on i386-unknown-freebsd7.0 with OpenSSL 
0.9.8e 23 Feb 2007
LOG5[15140:675287104]: Threading:PTHREAD SSL:ENGINE Sockets:POLL,IPv6 
Auth:LIBWRAP
LOG5[15140:675287104]: 5417 clients allowed

LOG5[9813:675289552]: Shop_01 accepted connection from 80.xxx.xxx.xxx:6526
LOG3[9813:675289552]: remote connect (93.www.xxx.98:80): Operation not 
permitted (1)
LOG5[9813:675289552]: Connection reset: 0 bytes sent to SSL, 0 bytes sent to 
socket



my conf :

pfsense interfaces:

WAN : 93.www.xxx.97 /zz
LAN : 192.168.0.222 /24


haproxy conf :

listen www1                     93.www.xxx.98:80
        mode                    http
        log                     global
        cookie                  funnySessionID prefix
        option                  dontlognull
        option                  httpclose
        option                  forwardfor except 93.www.xxx.98
        maxconn                 1000
        clitimeout              6000
        contimeout              12000
        srvtimeout              12000
        retries                 2
        server                  ap1 192.168.0.110:80 cookie ap1   check inter 
30000  weight 1
        server                  ap2 192.168.0.100:80 cookie ap2   check inter 
30000  weight 1

listen www2                     93.xxx.xxx.99:80
        mode                    http
        log                     global
        cookie                  funnySessionID prefix
        option                  dontlognull
        option                  forwardfor except 93.www.xxx.99
        option                  httpclose
        maxconn                 1000
        clitimeout              6000
        contimeout              12000
        srvtimeout              12000
        retries                 2
        server                  ap1 192.168.0.110:80 cookie ap1   check inter 
30000  weight 1
        server                  ap2 192.168.0.100:80 cookie ap2   check inter 
30000  weight 1


stunnel conf : 

chroot = /var/tmp/stunnel
setuid = stunnel
setgid = stunnel
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
output = /usr/local/etc/stunnel/stun.log

[shop_01]
key = /usr/local/etc/stunnel/a0xxxxx.key
cert = /usr/local/etc/stunnel/a0xxxxx.chain
accept = 93.www.xxx.98:443
connect = 93.www.xxx.98:80
TIMEOUTclose = 0

[shop_02]
key = /usr/local/etc/stunnel/6byyyyy.key
cert = /usr/local/etc/stunnel/6byyyyy.chain
accept = 93.www.xxx.99:443
connect = 93.www.xxx.99:80
TIMEOUTclose = 0


carp interfaces :

carp0: flags=49<UP,LOOPBACK,RUNNING> metric 0 mtu 1500
        inet 93.www.xxx.98 /zz
        carp: MASTER vhid 150 advbase 1 advskew 0
carp1: flags=49<UP,LOOPBACK,RUNNING> metric 0 mtu 1500
        inet 93.www.xxx.99 /zz
        carp: MASTER vhid 151 advbase 1 advskew 0



-- 
GRATIS für alle GMX-Mitglieder: Die maxdome Movie-FLAT!
Jetzt freischalten unter http://portal.gmx.net/de/go/maxdome01

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Commercial support available - https://portal.pfsense.org

Reply via email to