Okay thanks for the feedback. So then there is clearly still a bug in the acme web gui plugin regarding the OCSP option.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: oLeDfrEeZe on April 24, 2024, 10:30:25 PM
That's strange... Do you have OPNsense version 24.1.6 installed?
Quote from: meyergru on April 16, 2024, 09:25:20 AM
I have a question about HAproxy SSL performance with large downloads:
Using a NAT port forward to an internal HTTPS nginx server, I get full wire speed i.e. (45 MByte/s) from the outside, but using HAproxy following this tutorial, I am limited to download speeds of ~4-5 MByte/s.
I have tried to use HTTP instead of HTTPs for the backend server connection to no avail.
I suspected that the SSL termination would lead to an interrupt of the streaming flow in that each packet must be acknowledged over the whole chain before the next one can get requested, so I have somewhat optimized my throughput by a factor of 2 via this tuning:
tune.h2.max-frame-size 4048576
tune.pipesize 4048576
tune.h2.initial-window-size 1048576
tune.h2.be.initial-window-size 1048576
tune.h2.fe.initial-window-size 1048576
But it seems that the HTTPS termination within HAproxy itself is the culprit. I found some other source that suggest there might be a problem with only some ISPs showing that behaviour when SSL traffic is terminated by HAproxy.
Does everybody else see this or may my ISP really be the culprit?
Quote from: cookiemonster on February 22, 2024, 10:38:54 AMQuote from: johnmcallister on February 22, 2024, 01:35:06 AMThe main purpose of the tutorial is not to to access the OPN UI, for which your method makes perfect sense, but instead to reverse proxy services that are hosted internally in a LAN.
Just chiming in here --
Thanks very much doing all the work on this How-To, OP, and for keeping it updated, etc.
I successfully implemented it in my modest OPNsense instances/networks, before realizing that for small networks where there may never be more than perhaps 1 to 3 people logging in to a given OPNsense instance, in fact it's far more secure to simply shut off all HTTP listening on external network ports, and instead use SSH tunnels / port redirects, i.e. ssh -L 9450:localhost:80 my.opnsense.host to connect directly to the opnSense instance and access the webgui that way. Then it doesn't matter at all whether HTTPS is active as the entire connection takes place inside the highly-secured SSH network connection. With SSL tunnels there is no need for a webgui process to be listening anywhere except localhost:80.
It avoids the major overhead and ongoing maintenance complexity of getting a public/real SSL certificate issued, emplaced, and dealing with ongoing renewals, etc.
QuoteIt avoids the major overhead and ongoing maintenance complexity of getting a public/real SSL certificate issued, emplaced, and dealing with ongoing renewals, etc.
Quote from: mgrunwald on February 07, 2024, 02:42:05 PM
I am not sure this was mentioned before but https://desec.io no longer new registrations for DynDNS.
For the German speaking audience I can highly recommend https://ipv64.net/
Many texts on the website are English, but someone not speaking German might have problems understanding everything
Quote from: vladnik on February 03, 2024, 10:47:06 PM
Attention!
Hey everyone,
after the upgrade to 24.1, please check your cron job for updating OCSP data.
Since that function is no longer available from the list, mine was set to "Automatic firmware update", which could potentially be *really* bad :o
@TheHellSite: Thank you for the guide and the ongoing maintenance, much appreciated! :) (beer is on the way)
Quote from: techsolo12 on February 03, 2024, 11:26:50 PMQuote from: loop0 on February 03, 2024, 12:15:21 PM
@TheHellSite, many thanks and kudos for your tremendous effort, contribution and help!
I try to avoid seeking for help and solve my problems on my own. But after upgrading to 24.1 I stuck in the CRON configuration when it comes to the update HAProxy OCSP Data you mentioned in Part5.4, this feature has disappeared and can no longer be selected. I assume this is needed to get the OCSP must staple extension running.
Is there an alternative way of configuring or what I'm doing wrong or missing.
Thanks loop0
As i know the OCSP update cronjob isn't needed anymore since the OCSP feature was completely revamped with the actual version of haproxy 4.2 which is bundled in opnsense 24.1
I had some errors with the OCSP updates so i opened a issue in the opnsense/plugins github repo.
https://github.com/opnsense/plugins/issues/3755
Quote from: user78425653 on February 01, 2024, 04:00:45 PM
Hello @TheHellSite
I was using opnsense with HAProxy > 1 year.
Thanks for opffering this free tutorial, it definitely made the world better (at least for me).
The problem with opnsene 24.1 and HAProxy 4.2 hit me as well.
I will be happy when the "strict-sni" update of your guide is released.
Thank you in advance.
Quote from: netnut on January 31, 2024, 08:48:35 PMQuote from: TheHellSite on January 31, 2024, 03:36:29 PM
EDIT:
HAProxy refuses to start if a self-signed certificate is configured as (default) certificate under the SSL offloading section on a (HTTPS) frontend.
So for now it is best to remove the "INVALID_SNI" certificate as default from the HTTPS frontend.
@TheHellSite
I'm _not_ using your plugin, but I do use HAProxy on other systems with a crt-list, default self-signed cert and ocsp updates. So a shot in the dark, not sure if this "solves" your problem: You might want to declare your "default" certificate with "!*" in a crt-list to prevent errors:
https://www.haproxy.com/documentation/haproxy-configuration-manual/latest/#5.1-crt-list
/etc/haproxy/frontend-crt-list.conf
/path/to/default.crt.pem !*
/path/to/fqdn.crt.pem [ocsp-update on alpn h2,http/1.1] foo.bar
/path/to/wildcard.crt.pem [ocsp-update on alpn h2,http/1.1] *.foo.bar
1. Reinstall the HAProxy plugin.
pkg install -f os-haproxy
2. Apply the patch.
opnsense-patch -c plugins 404c19f6e
3. Restart HAProxy from the OPNsense dashboard or reboot OPNsense.Quote from: securid on January 21, 2024, 05:32:14 PMYes you were, since I was that "anyone" who fixed it for him and many others that contacted me via PM.Quote from: TheHellSite on January 21, 2024, 01:52:52 PMNo, and I wasn't asking you either.
My post was helpful to you?
Quote from: securid on January 21, 2024, 05:32:14 PMFine with me.Quote from: TheHellSite on January 21, 2024, 01:52:52 PMNot for replies like these.
Feel free to click [applaud] to the left underneath my profile.
Quote from: securid on January 21, 2024, 05:32:14 PMAgain, fine with me.Quote from: TheHellSite on January 21, 2024, 01:52:52 PMOnly in your dreams.
Additionally you can consider donating
Quote from: securid on January 21, 2024, 05:32:14 PMI think you are pretty smart, so if you take a look at the amount of views this guide has versus the number of people that actually donated you would be able to answer this on your own.
Unless you're desperate to earn something, then I can tell you these posts don't work in your advantage.
Quote from: securid on January 21, 2024, 05:32:14 PMJust so you know your issue and the ones of many others posting here is based on the fact that (you) misread / skipped / oversaw a tiny but very important bit of the configuration.
But then I think perhaps you're not aware how some other people read your messages, so perhaps this makes you aware. If you want to take my advise, stop posting if you don't want to help (its fine!) but don't be like this.