> After this patch, I found I got "A turbulence detected!" as soon as I opened
> the page, and BadCertificate errors in the log.
>
> To save others some debugging, the problem was that the patch changes the
> domain in the wss:// URL from the domain used by the user to access the
> site, to the one in http_frontend_public_address.
>
> Setting http_websocket_presented_address to match the value the client
> enters fixes it (though I'm not sure this is reliable; if the client used an
> IP address to access the server then it would fail again - they really have
> to match).

Setting http_websocket_presented_address if there is a difference
between where the backend listens, and where the frontend thinks it
should be (e.g. load-balancer/firewall inbetween) is the correct
behaviour.
If http_websocket_presented_address is not given, it defaults to
http_websocket_public_address, which defaults to the first
http_frontend_address if not given.

> BTW, are we ready to merge the client SSL support yet?

I re-merged with trunk (client-auth branch of my repo), and can
confirm that it is working nicely with client-auth in Chrome
23.0.1262.0 (155673) on Linux, Firefox 17 on Linux (both are Dev
channel). As for Windows: Chrome 22.0.1229.94 (Windows, Mac, Linux
Stable channel). Firefox 16.0.1 also works. Alas, it didn't work in IE
10.0.9200.16384 on Windows 8, but nobody uses IE anyway...

So, in short it seems to be working with all major browsers now on all
systems, so it should be good to commit (which I will do soon then).
It should work on XP as long as your certificate doesn't use SHA2.

Ali

Ps. On a slightly related note, SSL is still broken with the mobile
version of Chrome on Android for some reason. (It seems to be related
to the non-blocking IO method Jetty uses, and the limitations of Java
1.6 IIRC from when I last looked into this)

Reply via email to