Hello Dave,

thanks for answer.

I already tried this and I didn't succeed.
I tries configurations of curl/wget, traffic server, even a solution with
created plugin of traffic server, where I wanted to redirect ssl packets to
right ssl ports, but I wasn't succeed.

Is there another way how to block the connect request? At least some
script, which can redirect the ssl requests according to http header to
right port?

Jiri

2015-05-05 15:55 GMT+02:00 Dave Thompson <da...@yahoo-inc.com.invalid>:

> Jiri,
>
> This is a client initiated behavior issue.  If you want your client to SSL
> terminate at ATS, it needs to send an SSL client-hello rather than a
> CONNECT as the first message.    If you are using curl, a --proxy to an SSL
> site, will do a CONNECT rather than SSL terminate.   If in doubt, a
> tcpdump/wireshark can be used to confirm what client is sending.
> Perhaps your test browser configured to proxy tunnel as well.
>
> Dave
>
>
>      On Tuesday, May 5, 2015 6:02 AM, Jiří Podhorský <
> podhorsky....@gmail.com> wrote:
>
>
>  Hello,
>
> I'm trying to configure traffic server with ssl termination
>
> https://docs.trafficserver.apache.org/en/latest/admin/security-options.en.html
>
> But ssl termination don't work with browsers, wget or curl, because first
> request is CONNECT, which is not expected in ssl port and creates log:
>
> SSLv3, TLS handshake, Client hello (1):
> error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol
> Closing connection #0
>
> (plain http request connect is taken as Client hello message of ssl).
>
> I didn't find a way, how to redirect this message to not-ssl port or deny
> it.
>
> I tried to find some configuration or patch, but I didn't find any
> workarouds for this issue.
>
> Can you help me?
>
> Thanks.
>
> Jiri
>
>
>
>

Reply via email to