The connect request is being blocked - ATS is rejecting it. You can't redirect the SSL request because your user agent is not generating an SSL request - that's the root of the problem. The user agent is creating a CONNECT request. This also means the user agent is not creating SSL packets, either. If you want to terminate SSL in ATS, then you need 1) A certificate installed in ATS to use for the termination2) The user agent must connect to ATS as if it were the SSL endpoint, because it is the SSL endpoint for the user agent.3) This means the certificate in ATS must have a domain name that resolves to the ATS address and the user agent must directly connect to that domain name. E.g., if the domain name is "bob.com", then ATS must have a certificate for the name "bob.com", the user agent must connect via SSL to "bob.com", and the DNS resolution for "bob.com" must be the IP address of the ATS SSL proxy port. The most likely cause of getting CONNECT instead of SSL packets is because the user agent has been configured to use ATS as a proxy. That won't work, ATS must act as if it were the SSL termination point in order to be the SSL termination point.
On Tuesday, May 5, 2015 9:21 AM, Jiří Podhorský <podhorsky....@gmail.com> wrote: Hello Dave, thanks for answer. I already tried this and I didn't succeed. I tries configurations of curl/wget, traffic server, even a solution with created plugin of traffic server, where I wanted to redirect ssl packets to right ssl ports, but I wasn't succeed. Is there another way how to block the connect request? At least some script, which can redirect the ssl requests according to http header to right port? Jiri 2015-05-05 15:55 GMT+02:00 Dave Thompson <da...@yahoo-inc.com.invalid>: > Jiri, > > This is a client initiated behavior issue. If you want your client to SSL > terminate at ATS, it needs to send an SSL client-hello rather than a > CONNECT as the first message. If you are using curl, a --proxy to an SSL > site, will do a CONNECT rather than SSL terminate. If in doubt, a > tcpdump/wireshark can be used to confirm what client is sending. > Perhaps your test browser configured to proxy tunnel as well. > > Dave > > > On Tuesday, May 5, 2015 6:02 AM, Jiří Podhorský < > podhorsky....@gmail.com> wrote: > > > Hello, > > I'm trying to configure traffic server with ssl termination > > https://docs.trafficserver.apache.org/en/latest/admin/security-options.en.html > > But ssl termination don't work with browsers, wget or curl, because first > request is CONNECT, which is not expected in ssl port and creates log: > > SSLv3, TLS handshake, Client hello (1): > error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol > Closing connection #0 > > (plain http request connect is taken as Client hello message of ssl). > > I didn't find a way, how to redirect this message to not-ssl port or deny > it. > > I tried to find some configuration or patch, but I didn't find any > workarouds for this issue. > > Can you help me? > > Thanks. > > Jiri > > > >