* trondd <[email protected]> le [10-02-2017 12:32:36 -0500]:
> On Fri, February 10, 2017 11:48 am, Thuban wrote:
> > Hello,
> > I can't figure how to use letsencrypt certificates with relayd. I keep
> > getting this error :
> >
> >     # relayd -vvv -n
> >     /etc/relayd.conf:33: cannot load certificates for relay tlsforward
> >
> >
> > My relayd.conf :
> >
> >     # cat /etc/relayd.conf
> >     table <local> { 127.0.0.1 }
> >     ext_ip = 192.168.1.66
> >
> >     http protocol "https" {
> >         tcp { nodelay, sack, socket buffer 65536, backlog 100 }
> >         match response header set "Cache-Control" value "max-age=1814400"
> >         return error
> >         pass
> >         tls { no client-renegotiation, cipher-server-preference }
> >         tls ca key "/etc/letsencrypt/certificates/privkey.pem" password
""
> >         tls ca cert "/etc/letsencrypt/certificates/cert.pem"
> >     }
> >
> >
> >     relay "tlsforward" {
> >         listen on $ext_ip port 443 tls
> >         protocol "https"
> >         forward to <local> port 8443 mode loadbalance check tcp
> >     }
> >
> >
> >
> > Do you see any error or have any advice?
> >
> > Regards.
> >
> > thuban
> >
>
> 'ca key' and 'ca cert' is for MITM roll your own certs on the fly.
>
> For server certs, like a web server would have, you don't specify them.
> relayd looks for address:port.key and address:port.crt as per the 'listen
> on' description in relayd.conf(5)

Ok, it works as expected now. I created symlinks to
/etc/ssl/private/address.key
and for address.crt.

Thank you.

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]

Reply via email to