Aber hier sieht doch alles danach aus, als sei das Gegenteil der Fall: die Kette ist zu kurz. Normalerweise sollte sie so aussehen wie im Fall der firewall oben -- also über 3 Zertifikate gehen
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote"/var/etc/acme-client/home/"heruntergeladen und lokal verwendet.
echo -n | openssl s_client -connect server:443 verwende, erhalte ich
CONNECTED(00000005)
depth=0 CN = server.meine-domain.de
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = server.meine-domain.de
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
0 s:CN = server.meine-domain.de
i:C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
---
Verify return code: 21 (unable to verify the first certificate)
---
Certificate chain
0 s:CN = firewall.meine-domain.de
i:C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
1 s:C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
#
# Automatically generated configuration.
# Do not edit this file manually.
#
global
# NOTE: Could be a security issue, but required for some feature.
uid 80
gid 80
chroot /var/haproxy
daemon
stats socket /var/run/haproxy.socket level admin
nbproc 1
nbthread 1
tune.ssl.default-dh-param 1024
spread-checks 0
tune.chksize 16384
tune.bufsize 16384
tune.lua.maxmem 0
log /var/run/log local0 info
defaults
log global
option redispatch -1
timeout client 30s
timeout connect 30s
timeout server 30s
retries 3
# autogenerated entries for ACLs
# autogenerated entries for config in backends/frontends
# autogenerated entries for stats
# Frontend: http_DMZ_WAN (internal and external http)
frontend http_DMZ_WAN
bind 172.17.17.252:80 name 172.17.17.252:80
bind 172.17.17.253:80 name 172.17.17.253:80
mode http
option http-keep-alive
option forwardfor
# tuning options
timeout client 30s
# logging options
# ACL: find_acme_challenge
acl acl_45e5bfd9525e2e7.18783878 path_beg -i /.well-known/acme-challenge/
# ACL: Nextcloud_Bedingung
acl acl_5ebafdd99a40d7.14505678 hdr_end(host) -i nextcloud2.linux.my-domain.com
# ACTION: redirect_acme_challenges
use_backend acme_challenge_backend if acl_45e5bfd9525e2e7.18783878
# ACTION: Nextcloud
use_backend Nextcloud_Backend if acl_5ebafdd99a40d7.14505678
# Frontend: https_DMZ_WAN (internal and external https)
frontend https_DMZ_WAN
bind 172.17.17.252:443 name 172.17.17.252:443 ssl crt-list /tmp/haproxy/ssl/4baf2ad81dea1.61416316.certlist
bind 172.17.17.253:443 name 172.17.17.253:443 ssl crt-list /tmp/haproxy/ssl/4baf2ad81dea1.61416316.certlist
mode http
option http-keep-alive
option forwardfor
# tuning options
timeout client 30s
# logging options
# ACL: Nextcloud_Bedingung
acl acl_5ebafdd99a40d7.14505678 hdr_end(host) -i nextcloud2.linux.my-domain.com
# ACTION: Nextcloud
use_backend Nextcloud_Backend if acl_5ebafdd99a40d7.14505678
# Frontend: https_DMZ (internal https)
frontend https_DMZ
bind 172.17.17.253:443 name 172.17.17.253:443 ssl crt-list /tmp/haproxy/ssl/5dbaf62c571809.61471992.certlist
mode http
option http-keep-alive
option forwardfor
# tuning options
timeout client 30s
# logging options
# Backend: Nextcloud_Backend (Nextcloud_Backend)
backend Nextcloud_Backend
# health checking is DISABLED
mode http
balance source
# stickiness
stick-table type ip size 50k expire 30m
stick on src
# tuning options
timeout connect 30s
timeout server 30s
# ACL: not-SSL
acl acl_5dbaf90c2d38c3.66671068 req.proto_http
# ACTION: redirect_SSL
http-request redirect scheme https code 301 if acl_5dbaf90c2d38c3.66671068
http-reuse safe
server nextcloud_Host 172.17.17.5:443
# Backend: acme_challenge_backend (Added by Let's Encrypt plugin)
backend acme_challenge_backend
# health checking is DISABLED
mode http
balance source
# stickiness
stick-table type ip size 50k expire 30m
stick on src
# tuning options
timeout connect 30s
timeout server 30s
http-reuse safe
server acme_challenge_host 127.0.0.1:43580
Ablehnen:
Protokoll Quelle Port Ziel Port Gateway Zeitplan Beschreibung
IPv4 TCP/UDP WiFi-Netz * IP des Controllers 22 * * ssh Zugriff soll auf Controller verboten sein