Hi all,
  We have a test haproxy instance that is using a letscrypt certificate, and is 
in a DMZ zone. We have internal network servers delivering an application via 
https using an internal CA certificate, and all works fine - the client 
connects, sees the letscrypt cert and since the load balancer o/s has the 
internal CA in its trusted root certs, the verification works there too.

The query I have is where we fail both backend servers we're using and have the 
client redirect to an internal website errorloc directive via https to deliver 
a "sorry the service isn't available" :

Here's the config:

frontend ft_web_ssl
          bind 0.0.0.0:443 name https ssl crt 
/usr/local/bin/dehydrated/certs/portal.fqdn/concat.pem
          mode http
          option httplog
          option forwardfor
          tcp-request connection track-sc0 src table connections
          default_backend bk_portal_ssl

backend bk_portal_ssl
          mode http
          option httplog
          option httpchk GET /Login/Heartbeat HTTP/1.0\r\nHost:\ 
portal.sath.nhs.uk
          http-check expect rstatus 200
          balance roundrobin
          stick on src table connections
          cookie SERVERID insert nocache indirect
          default-server inter 2s rise 10 fall 20 on-marked-down 
shutdown-sessions
          errorloc 503 https://intranet/clinicalportal/clinicalportalholding.htm
          server RSH-CP-IIS1 192.168.176.175:443 cookie 1 check ssl
          server RSH-CP-IIS2 192.168.176.176:443 cookie 2 check ssl

First of all, the errorloc "redirection" from a 503 works fine but since this 
intranet page is configured using an internal CA certificate and for some 
reason the client doesn't see the letscrypt certificate, rather the one from 
the website itself, it therefore warns on the client browser if they don't have 
the internal CA root cert installed as trusted.

I would have thought that the client should get the letscrypt frontend 
certificate in this case? How come not, and is there any way of fixing this? 
I'd rather keep ssl between DMZ and intranet zone if possible; obviously using 
plain http for the errorloc 503 is one way around, but would rather not do this.

Thanks
Andy

Reply via email to