Varnish and squid are really tailored for things other than (what I understand 
at least) what you're looking for.  I'd personally throw those out.
I'd also not introduce stunnel as it add unnecessary complexion.  I also had 
some weirdness trying to forward to another server *running on the same 
pfsense* machine due to networking / etc (that may have to been to work with 
floating carp IPs or something).  Again, just added complexity.  IMO stunnel 
was mostly around for the days when haproxy didn't support ssl which I believe 
was by far it's biggest use case.
Port forwarding to an internal box would certainly work.  I prefer to stay away 
from 'reflection' stuff however for internal clients...just a preference so I 
like binding directly on the pfsense machine to avoid all that. May not be an 
issue in your situation.
haproxy *does* support SNI and this is exactly how I'm using it in a personal 
setup.  The pfsense gui has a nice 'shared' frontend feature that allows you to 
define a simple acl based off SNI hostname to make sure you proxy to the 
correct backend.  I'm personally also using a self-signed CA for which I 
created a wildcard cert but separate certs work just as well with each of the 
per-host frontends that you create.
Apache supports SNI as well.
Just to understand my setup a little more closely, I'm running several personal 
(mostly private) sites off my little home connection.  I wanted to be able to 
access them while out and about *and* while at home ('behind' the router) 
without any weirdness (changing IPs for example for git+ssh access).  After 
setting everything up through haproxy I now have ~10 different services running 
each on a unique sub-domain that I hit directly.  In my current setup since 
they are just silly personal things (a personal gitlab, blog, rss reader, etc) 
I don't really get anything out of the 'load balancing' side of things but if 
you anticipate needing that it makes the decision over haproxy vs apache much 
easier.
Travis Hansen
[email protected] 


     On Sunday, May 31, 2015 7:32 AM, Adam Thompson <[email protected]> 
wrote:
   

 Oh, shoot, that's a good point - I probably do need SNI support for SSL. I may 
be able to get a wildcard cert, but that will be an issue one way or another.

Varnish doesn't support SSL at all, although I could theoretically do it with 
stunnel and a wildcard cert.
Squid does support SSL, but appears to require wildcard cert. 
Squid3 *may* support SNI, can't tell.
Haproxy supports SNI; hopefully the pfSense package is new enough to include 
that.
Apache supports SNI, supposedly.

So I'm still left with a (overly, IMHO) large list.
I could also just port-forward TCP/{80,443} to a host behind the firewall and 
do everything there, too.

Argh, too many options, not enough clarity on which packages are supported vs. 
which ones are semi-orphaned.

-Adam

On May 30, 2015 11:12:01 PM CDT, Travis Hansen <[email protected]> wrote:
If you're looking for pure proxy frontend I'd stick with haproxy or apache (I 
use haproxy).
haproxy provides load balancing and can do other things besides strictly 
http(s) such a pure tcp and transparent proxy stuff.
Apache provides some things like mod_rewrite (I assume the pfsense build comes 
with that) etc that aren't easily done with haproxy.
I could be wrong but if you're looking for SSL offloading (I ensure all traffic 
goes over SSL) varnish and squid would be out of the picture. Travis Hansen
[email protected] 


     On Saturday, May 30, 2015 8:25 PM, Adam Thompson <[email protected]> 
wrote:
   

 I need to run a reverse proxy on a pfSense gateway - multiple websites, 
one public IP, the usual reason.
However, I see there's a larger selection available than the last time I 
looked.

It appears we now have:
* Apache w/mod_security-dev v0.43 / 0.22
* haproxy-1_5 v0.23
* haproxy-devel v0.24
* Proxy Server w/mod_security v0.1.7 /0.22.999
* squid
* squid3
* varnish3

1. Have I missed any?
2. Are "Apache w/mod_security-dev" and "Proxy Server w/mod_security" 
essentially the same thing?
3. For relatively simple cases (straightforward hostname-to-internal-IP 
mapping), is there any compelling reason to use one over another on 
pfSense 2.2 today?  FWIW, this firewall is relatively underpowered 
(PowerEdge 1750, dual 2.4GHz P4-era Xeons).


-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

  
_______________________________________________
pfSense mailing list
https://lists.pfsense.org/mailman/listinfo/list
Support the project with Gold! https://pfsense.org/gold

Reply via email to