Hello all,

We have been using SSL passthrough for a long time but a new set of 
applications require I
decrypt at the load-balancer to direct traffic and re-encrypt for sending to 
the backend.  For
testing, I'm using a self-signed cert at haproxy and the back end web server 
has a formal certificate.
This all works except the client browser is showing the connection as insecure. 
 Would a formal
certificate at haproxy fix this or is there another way to keep the browser 
happy using the
self-signed cert?  The config I'm using is below.  Thanks!

frontend http-in-nlbtest

        bind xx.xx.xx.xx:80
        bind xx.xx.xx.xx:443 ssl crt /xxxxxxxxx/ec-xxxxx.pem     # Note: 
self-signed cert

        mode         http
        no option  http-server-close
        timeout     client 1m

        http-request add-header X-Forwarded-Proto https
        http-request add-header X-Forwarded-Port  443

        http-response add-header Strict-Transport-Security max-age=3600   # 60 
minutes

        acl Host_NLBTest      hdr_beg(host) -i nlbtest

        use_backend  Cluster_NLBTEST_NoSSL  if  !{ ssl_fc }  Host_NLBTest
        use_backend  Cluster_NLBTEST_SSL       if    { ssl_fc }  Host_NLBTest

backend Cluster_AD_APPENV2019_PRODUCTION_SSL
        mode    http
        balance roundrobin

        server  backendhost1  backendhost1:443  ssl  verify  none  check-ssl  
maxconn 128
        server  backendhost2  backendhost2:443  ssl  verify  none  check-ssl  
maxconn 128

Reply via email to