Le 18/11/2014 23:16, Brian Menges a écrit :
Oops, thought I did that:

# openssl s_client -connect 216.121.17.252:443

From where did you execute the command ? From the haproxy server ?
Can you verify that haproxy doesn't see your servers as DOWN ?

CONNECTED(00000003)
depth=1 C = US, ST = Arizona, L = Scottsdale, O = "GoDaddy.com, Inc.", OU = 
http://certificates.godaddy.com/repository, CN = Go Daddy Secure Certification Authority, 
serialNumber = 07969287
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
  0 s:/C=US/ST=Texas/L=Dallas/O=ARTIZONE INC./CN=*.artizone.com
    i:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, 
Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure 
Certification Authority/serialNumber=07969287
  1 s:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, 
Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure 
Certification Authority/serialNumber=07969287
    i:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification 
Authority
---
Server certificate
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
subject=/C=US/ST=Texas/L=Dallas/O=ARTIZONE INC./CN=*.artizone.com
issuer=/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, 
Inc./OU=http://certificates.godaddy.com/repository/CN=Go Daddy Secure 
Certification Authority/serialNumber=07969287
---
No client certificate CA names sent
---
SSL handshake has read 3247 bytes and written 570 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
     Protocol  : TLSv1.2
     Cipher    : ECDHE-RSA-AES256-SHA384
     Session-ID: 
3E310000B5ECB76581C58C94477A6DA925EB0245BF3EAA9103CA81179289FCAB
     Session-ID-ctx:
     Master-Key: 
60BCC13E943926E284767D695B3B61F47837D1E034DAF28D7AAB4CC557FB73E56AE52FEBFC4D6C717F5DE29550E59F05
     Key-Arg   : None
     PSK identity: None
     PSK identity hint: None
     SRP username: None
     Start Time: 1416348829
     Timeout   : 300 (sec)
     Verify return code: 20 (unable to get local issuer certificate)
---
GET /
... <html> ...

Works both with and without the '-tlsv1' flag.

- Brian Menges
DevOps Architect @ GoGrid, LLC.

-----Original Message-----
From: Lukas Tribus [mailto:[email protected]]
Sent: Tuesday, November 18, 2014 1:51 PM
To: Brian Menges; [email protected]
Subject: RE: debugging ssl passthrough+haproxy

Getting the same sort of reply:
# openssl s_client -connect 216.121.28.78:443

No, I meant to connect to the origin server, not haproxy itself, but from the 
proxy VM:

openssl s_client -connect 216.121.17.252:443



Regards,

Lukas



________________________________

The information contained in this message, and any attachments, may contain 
confidential and legally privileged material. It is solely for the use of the 
person or entity to which it is addressed. Any review, retransmission, 
dissemination, or action taken in reliance upon this information by persons or 
entities other than the intended recipient is prohibited. If you receive this 
in error, please contact the sender and delete the material from any computer.



--
Cyril Bonté

Reply via email to