Since version 10.0.x, if you want to use a reverse proxy and apply for a certificate outside docker, you can use FORCE_HTTPS_IN_CONF to force write https://<your_host> in the configuration file.e.g.seafile: ... environment: ... - SEAFILE_SERVER_LETSENCRYPT=false - SEAFILE_SERVER_HOSTNAME=seafile.example.com - FORCE_HTTPS_IN_CONF=true ...
and another victim of this error here both when trying to connect via Code: [Select]http and Code: [Select]httpsCode: [Select]2023-11-22T16:33:22 Informational haproxy 134.xx.xx.xx:41647 [22/Nov/2023:16:33:22.341] 1_HTTP_frontend/127.4.4.3:80: Received something which does not look like a PROXY protocol header 2023-11-22T16:33:21 Informational haproxy 134.xx.xx.xx:41645 [22/Nov/2023:16:33:21.262] 1_HTTP_frontend/127.4.4.3:80: Received something which does not look like a PROXY protocol header 2023-11-22T16:33:18 Informational haproxy 134.xx.xx.xx:41642 [22/Nov/2023:16:33:18.847] 1_HTTPS_frontend/127.4.4.3:443: Received something which does not look like a PROXY protocol header 2023-11-22T16:33:18 Informational haproxy 134.xx.xx.xx:41641 [22/Nov/2023:16:33:18.795] 1_HTTPS_frontend/127.4.4.3:443: Received something which does not look like a PROXY protocol headerVersions:Code: [Select]Name HAProxyVersion 2.6.15-446b02cRelease_date 2023/08/09Code: [Select]Versions OPNsense 23.7.8_1-amd64FreeBSD 13.2-RELEASE-p5OpenSSL 1.1.1w 11 Sep 2023I ran out of ideas what to try config is:Code: [Select]## Automatically generated configuration.# Do not edit this file manually.#global uid 80 gid 80 chroot /var/haproxy daemon stats socket /var/run/haproxy.socket group proxy mode 775 level admin nbthread 4 hard-stop-after 60s no strict-limits maxconn 10000 tune.ssl.default-dh-param 8192 spread-checks 2 tune.bufsize 16384 tune.lua.maxmem 0 log /var/run/log local1 debug lua-prepend-path /tmp/haproxy/lua/?.luadefaults log global option redispatch -1 maxconn 5000 timeout client 30s timeout connect 30s timeout server 30s retries 3 default-server init-addr last,libc default-server maxconn 5000# autogenerated entries for ACLs# autogenerated entries for config in backends/frontends# autogenerated entries for stats# Resolver: opnsenseresolvers 64fcd546611ba3.78740961 nameserver 127.0.0.1:53 127.0.0.1:53 nameserver 192.168.178.1:53 192.168.178.1:53 nameserver 9.9.9.9:53 9.9.9.9:53 nameserver 192.168.80.2:53 192.168.80.2:53 parse-resolv-conf resolve_retries 3 timeout resolve 1s timeout retry 1s# NOTE: Mailer alert bofh ignored: not configured in any backend# Mailer: alert CBmailers 64fcc379c27b34.94392037 timeout mail 30s mailer blah.blubb.25# Frontend: 0_SNI_frontend (Listening on 0.0.0.0:80, 0.0.0.0:443, )frontend 0_SNI_frontend bind 0.0.0.0:443 name 0.0.0.0:443 bind 0.0.0.0:80 name 0.0.0.0:80 mode tcp default_backend SSL-backend # logging options# Frontend: 1_HTTP_frontend (listening on 127.4.4.3:80)frontend 1_HTTP_frontend bind 127.4.4.3:80 name 127.4.4.3:80 accept-proxy mode http option http-keep-alive option forwardfor http-request use-service prometheus-exporter if { path /metrics } # logging options # ACL: NoSSL_condition acl acl_6314a0aad6d518.84034638 ssl_fc # ACL: find_acme_challenge acl acl_6339cb3bd963e1.30823960 path_beg -i /.well-known/acme-challenge/ # ACTION: HTTPtoHTTPS_rule http-request redirect scheme https code 301 if !acl_6314a0aad6d518.84034638 # ACTION: redirect_acme_challenges use_backend acme_challenge_backend if acl_6339cb3bd963e1.30823960# Frontend: 1_HTTPS_frontend (listening on 127.4.4.3:443)frontend 1_HTTPS_frontend http-response set-header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" bind 127.4.4.3:443 name 127.4.4.3:443 accept-proxy ssl curves secp384r1 no-sslv3 no-tlsv10 no-tlsv11 no-tls-tickets ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305 ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/6314a6a33cce38.68245567.certlist mode http option http-keep-alive option forwardfor http-request use-service prometheus-exporter if { path /metrics } timeout client 15m # logging options # ACTION: PUBLIC_SUBDOMAINS_map_rule # NOTE: actions with no ACLs/conditions will always match use_backend %[req.hdr(host),lower,map_dom(/tmp/haproxy/mapfiles/6314a164535f16.33310179.txt)] # Backend (DISABLED): SSL-backend-old ()# Backend: HomeAssistant_Backend (Homeassistant)backend HomeAssistant_Backend # health checking is DISABLED email-alert mailers 64fcc379c27b34.94392037 email-alert from a@b.c email-alert to a@b.c email-alert level alert mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server HomeAssistant 192.168.80.21:8123 resolve-prefer ipv4# Backend: PhotoPrism (PhotoPrism App on TrueNAS)backend PhotoPrism # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server PhotoPrism 192.168.80.30:2342 # Backend: Syncthing (Syncthing on TRueNAS)backend Syncthing # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server Syncthing 192.168.80.17:20910 # Backend: Paperless (paperless-ngx DMS)backend Paperless # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server PaperLess 192.168.80.30:8000 # Backend: FileBrowser (filebrowser on TrueNAS)backend FileBrowser # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server FileBrowser 192.168.80.17:10187 # Backend: acme_challenge_backend (Added by ACME Client plugin)backend acme_challenge_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server acme_challenge_host 127.0.0.1:43580 # Backend: SSL-backend (SSL backend pool)backend SSL-backend # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server SSL_server 127.4.4.3 send-proxy-v2 check-send-proxy# Backend: Libre_photos_backend (LibrePhotos in VM)backend Libre_photos_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server LibrePhotos 192.168.80.30:3000 # Backend: Nextcloud_Backend (Nextcloud Backend)backend Nextcloud_Backend # health checking is DISABLED email-alert mailers 64fcc379c27b34.94392037 email-alert from a@b.c email-alert to a@b.c email-alert level alert mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server Nextcloud 192.168.80.30:80 resolve-prefer ipv4# Backend: Jellyfin_backend (Jellyfin in VM)backend Jellyfin_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server Jellyfin 192.168.80.30:8096 # Backend: PaperMerge (papermerge DMS)backend PaperMerge # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server PaperMerge 192.168.80.17:10141 listen local_statistics bind 127.0.0.1:8822 mode http stats uri /haproxy?stats stats realm HAProxy\ statistics stats admin if TRUE# remote statistics are DISABLEDfrontend prometheus_exporter bind *:8404 mode http http-request use-service prometheus-exporter if { path /metrics }should I switch to nginx as reverse proxy really?
http
https
2023-11-22T16:33:22 Informational haproxy 134.xx.xx.xx:41647 [22/Nov/2023:16:33:22.341] 1_HTTP_frontend/127.4.4.3:80: Received something which does not look like a PROXY protocol header 2023-11-22T16:33:21 Informational haproxy 134.xx.xx.xx:41645 [22/Nov/2023:16:33:21.262] 1_HTTP_frontend/127.4.4.3:80: Received something which does not look like a PROXY protocol header 2023-11-22T16:33:18 Informational haproxy 134.xx.xx.xx:41642 [22/Nov/2023:16:33:18.847] 1_HTTPS_frontend/127.4.4.3:443: Received something which does not look like a PROXY protocol header 2023-11-22T16:33:18 Informational haproxy 134.xx.xx.xx:41641 [22/Nov/2023:16:33:18.795] 1_HTTPS_frontend/127.4.4.3:443: Received something which does not look like a PROXY protocol header
Name HAProxyVersion 2.6.15-446b02cRelease_date 2023/08/09
Versions OPNsense 23.7.8_1-amd64FreeBSD 13.2-RELEASE-p5OpenSSL 1.1.1w 11 Sep 2023
## Automatically generated configuration.# Do not edit this file manually.#global uid 80 gid 80 chroot /var/haproxy daemon stats socket /var/run/haproxy.socket group proxy mode 775 level admin nbthread 4 hard-stop-after 60s no strict-limits maxconn 10000 tune.ssl.default-dh-param 8192 spread-checks 2 tune.bufsize 16384 tune.lua.maxmem 0 log /var/run/log local1 debug lua-prepend-path /tmp/haproxy/lua/?.luadefaults log global option redispatch -1 maxconn 5000 timeout client 30s timeout connect 30s timeout server 30s retries 3 default-server init-addr last,libc default-server maxconn 5000# autogenerated entries for ACLs# autogenerated entries for config in backends/frontends# autogenerated entries for stats# Resolver: opnsenseresolvers 64fcd546611ba3.78740961 nameserver 127.0.0.1:53 127.0.0.1:53 nameserver 192.168.178.1:53 192.168.178.1:53 nameserver 9.9.9.9:53 9.9.9.9:53 nameserver 192.168.80.2:53 192.168.80.2:53 parse-resolv-conf resolve_retries 3 timeout resolve 1s timeout retry 1s# NOTE: Mailer alert bofh ignored: not configured in any backend# Mailer: alert CBmailers 64fcc379c27b34.94392037 timeout mail 30s mailer blah.blubb.25# Frontend: 0_SNI_frontend (Listening on 0.0.0.0:80, 0.0.0.0:443, )frontend 0_SNI_frontend bind 0.0.0.0:443 name 0.0.0.0:443 bind 0.0.0.0:80 name 0.0.0.0:80 mode tcp default_backend SSL-backend # logging options# Frontend: 1_HTTP_frontend (listening on 127.4.4.3:80)frontend 1_HTTP_frontend bind 127.4.4.3:80 name 127.4.4.3:80 accept-proxy mode http option http-keep-alive option forwardfor http-request use-service prometheus-exporter if { path /metrics } # logging options # ACL: NoSSL_condition acl acl_6314a0aad6d518.84034638 ssl_fc # ACL: find_acme_challenge acl acl_6339cb3bd963e1.30823960 path_beg -i /.well-known/acme-challenge/ # ACTION: HTTPtoHTTPS_rule http-request redirect scheme https code 301 if !acl_6314a0aad6d518.84034638 # ACTION: redirect_acme_challenges use_backend acme_challenge_backend if acl_6339cb3bd963e1.30823960# Frontend: 1_HTTPS_frontend (listening on 127.4.4.3:443)frontend 1_HTTPS_frontend http-response set-header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" bind 127.4.4.3:443 name 127.4.4.3:443 accept-proxy ssl curves secp384r1 no-sslv3 no-tlsv10 no-tlsv11 no-tls-tickets ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305 ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 alpn h2,http/1.1 crt-list /tmp/haproxy/ssl/6314a6a33cce38.68245567.certlist mode http option http-keep-alive option forwardfor http-request use-service prometheus-exporter if { path /metrics } timeout client 15m # logging options # ACTION: PUBLIC_SUBDOMAINS_map_rule # NOTE: actions with no ACLs/conditions will always match use_backend %[req.hdr(host),lower,map_dom(/tmp/haproxy/mapfiles/6314a164535f16.33310179.txt)] # Backend (DISABLED): SSL-backend-old ()# Backend: HomeAssistant_Backend (Homeassistant)backend HomeAssistant_Backend # health checking is DISABLED email-alert mailers 64fcc379c27b34.94392037 email-alert from a@b.c email-alert to a@b.c email-alert level alert mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server HomeAssistant 192.168.80.21:8123 resolve-prefer ipv4# Backend: PhotoPrism (PhotoPrism App on TrueNAS)backend PhotoPrism # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server PhotoPrism 192.168.80.30:2342 # Backend: Syncthing (Syncthing on TRueNAS)backend Syncthing # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server Syncthing 192.168.80.17:20910 # Backend: Paperless (paperless-ngx DMS)backend Paperless # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server PaperLess 192.168.80.30:8000 # Backend: FileBrowser (filebrowser on TrueNAS)backend FileBrowser # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server FileBrowser 192.168.80.17:10187 # Backend: acme_challenge_backend (Added by ACME Client plugin)backend acme_challenge_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server acme_challenge_host 127.0.0.1:43580 # Backend: SSL-backend (SSL backend pool)backend SSL-backend # health checking is DISABLED mode tcp balance source # stickiness stick-table type ip size 50k expire 30m stick on src server SSL_server 127.4.4.3 send-proxy-v2 check-send-proxy# Backend: Libre_photos_backend (LibrePhotos in VM)backend Libre_photos_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server LibrePhotos 192.168.80.30:3000 # Backend: Nextcloud_Backend (Nextcloud Backend)backend Nextcloud_Backend # health checking is DISABLED email-alert mailers 64fcc379c27b34.94392037 email-alert from a@b.c email-alert to a@b.c email-alert level alert mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server Nextcloud 192.168.80.30:80 resolve-prefer ipv4# Backend: Jellyfin_backend (Jellyfin in VM)backend Jellyfin_backend # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server Jellyfin 192.168.80.30:8096 # Backend: PaperMerge (papermerge DMS)backend PaperMerge # health checking is DISABLED mode http balance source # stickiness stick-table type ip size 50k expire 30m stick on src http-reuse safe server PaperMerge 192.168.80.17:10141 listen local_statistics bind 127.0.0.1:8822 mode http stats uri /haproxy?stats stats realm HAProxy\ statistics stats admin if TRUE# remote statistics are DISABLEDfrontend prometheus_exporter bind *:8404 mode http http-request use-service prometheus-exporter if { path /metrics }
Quote from: TheHellSite on January 21, 2024, 01:52:52 pmMy post was helpful to you?No, and I wasn't asking you either.
My post was helpful to you?
Quote from: TheHellSite on January 21, 2024, 01:52:52 pmFeel free to click [applaud] to the left underneath my profile. Not for replies like these.
Feel free to click [applaud] to the left underneath my profile.
Quote from: TheHellSite on January 21, 2024, 01:52:52 pmAdditionally you can consider donatingOnly in your dreams.
Additionally you can consider donating
Unless you're desperate to earn something, then I can tell you these posts don't work in your advantage.
But then I think perhaps you're not aware how some other people read your messages, so perhaps this makes you aware. If you want to take my advise, stop posting if you don't want to help (its fine!) but don't be like this.
...
1. Reinstall the HAProxy plugin.pkg install -f os-haproxy2. Apply the patch.opnsense-patch -c plugins 404c19f6e3. Restart HAProxy from the OPNsense dashboard or reboot OPNsense.
EDIT: HAProxy refuses to start if a self-signed certificate is configured as (default) certificate under the SSL offloading section on a (HTTPS) frontend.So for now it is best to remove the "INVALID_SNI" certificate as default from the HTTPS frontend.
/path/to/default.crt.pem !*/path/to/fqdn.crt.pem [ocsp-update on alpn h2,http/1.1] foo.bar/path/to/wildcard.crt.pem [ocsp-update on alpn h2,http/1.1] *.foo.bar
Quote from: TheHellSite on January 31, 2024, 03:36:29 pmEDIT: HAProxy refuses to start if a self-signed certificate is configured as (default) certificate under the SSL offloading section on a (HTTPS) frontend.So for now it is best to remove the "INVALID_SNI" certificate as default from the HTTPS frontend.@TheHellSiteI'm _not_ using your plugin, but I do use HAProxy on other systems with a crt-list, default self-signed cert and ocsp updates. So a shot in the dark, not sure if this "solves" your problem: You might want to declare your "default" certificate with "!*" in a crt-list to prevent errors:https://www.haproxy.com/documentation/haproxy-configuration-manual/latest/#5.1-crt-list/etc/haproxy/frontend-crt-list.confCode: [Select]/path/to/default.crt.pem !*/path/to/fqdn.crt.pem [ocsp-update on alpn h2,http/1.1] foo.bar/path/to/wildcard.crt.pem [ocsp-update on alpn h2,http/1.1] *.foo.bar