1
24.1 Legacy Series / Re: Trouble accessing HTTP-only web sites via port 80
« on: June 04, 2024, 09:26:27 pm »
"Well it does no impact openvpn cause the webgui uses tcp port 443 and openvpn uses udp port 443. So thats okay."
Clarification of OpenVPN ports:
TCP 443: used only for client web access from external IP addresses. Never used unless the OpenVPN client fails.
TCP 943: used for admin web access from external IP addresses. This is used to maintain OpenVPN.
UDP 1194: used for all traffic to/from the OpenVPN server with external clients. UDP 1194 is the normal operating mode for OpenVPN clients. TCP port 443 can be used for better reliability but slower traffic processing. There is no UDP 443 that I've found in the OpenVPN documentation.
What confuses me is that there are identical port forwards and firewall rules for ports 80, 443, 943, and 1194 but only port 80 fails. I don't understand why port 80 is so "special" to OPNsense that it doesn't follow the same rules as 443, 943, and 1194.
Also confusing is that I can access HTTP ports on port 80 from any device's web browser and replies come back to the correct device as expected. The only failing reply is LetsEncrypt which starts a web server on port 80 of the OpenVPN server during certbot renewal. I assume LetsEncrypt sends a request over port 80 but I'm unable to see this traffic moving through the firewall in either direction. There's no documentation of how the web server LetsEncrypt running on port 80 communicates to the outside world and I have yet to be able to see this traffic.
As an aside, I tried using lego to generate certificates via port 443 on the OpenVPN server and this almost works. By almost, I mean the communication process with the outside world via port 443 is successful but the certs I get back don't work with OpenVPN for some reason.
I'll investigate your suggestion regarding SLACC on the acme client but I don't understand anything about this process. I'll also investigate the reverse proxy but again, I have no understanding of this process either.
Clarification of OpenVPN ports:
TCP 443: used only for client web access from external IP addresses. Never used unless the OpenVPN client fails.
TCP 943: used for admin web access from external IP addresses. This is used to maintain OpenVPN.
UDP 1194: used for all traffic to/from the OpenVPN server with external clients. UDP 1194 is the normal operating mode for OpenVPN clients. TCP port 443 can be used for better reliability but slower traffic processing. There is no UDP 443 that I've found in the OpenVPN documentation.
What confuses me is that there are identical port forwards and firewall rules for ports 80, 443, 943, and 1194 but only port 80 fails. I don't understand why port 80 is so "special" to OPNsense that it doesn't follow the same rules as 443, 943, and 1194.
Also confusing is that I can access HTTP ports on port 80 from any device's web browser and replies come back to the correct device as expected. The only failing reply is LetsEncrypt which starts a web server on port 80 of the OpenVPN server during certbot renewal. I assume LetsEncrypt sends a request over port 80 but I'm unable to see this traffic moving through the firewall in either direction. There's no documentation of how the web server LetsEncrypt running on port 80 communicates to the outside world and I have yet to be able to see this traffic.
As an aside, I tried using lego to generate certificates via port 443 on the OpenVPN server and this almost works. By almost, I mean the communication process with the outside world via port 443 is successful but the certs I get back don't work with OpenVPN for some reason.
I'll investigate your suggestion regarding SLACC on the acme client but I don't understand anything about this process. I'll also investigate the reverse proxy but again, I have no understanding of this process either.