Hello,

I am trying to solve a problem and I am really out of ideas.

I want
to use relayd to setup a transparent reversed proxy with ssl offloading for a
local daemon.

The data flow is the follwing:

Client ------>| $ext_if    
relayd box    lo0 (local daemon) |      


It is possible for local daemon to
see the original client ip, instead of 127.0.0.1 ?


The original client IP
should arrive to the local daemon, because it is needed in further operations.
If it would have been only logging that would have been a problem.

I am aware
of the setup describe here:
http://marc.info/?l=openbsd-misc&m=130479125318862&w=2

but I do not know how
to obtain this behaviour with a local bounded daemon.

This local daemon is
running under an unpriviledged user.

I have the follwing setup:


in
/etc/relayd.conf:

ext_addr="192.162.16.133"

protocol tcp_ssl_prot {
       
        # Various TCP performance options
        tcp { nodelay, sack, socket
buffer 65536, backlog 128 }

        ssl { no sslv2, sslv3, tlsv1, ciphers
"HIGH" }
        ssl session cache disable
}


relay tcp_ssl_inet4 {
        #
Run as a SSL accelerator
        listen on $ext_addr port 1122 ssl
       
        protocol "tcp_ssl_prot"
        
        # Forward to hosts in the
webhosts table using a src/dst hash
        transparent forward to 127.0.0.1
port 1133 interface lo0
}


pf is disabled (in pf.conf I really do not know
what should I put)


Any idea very much appreciated.

Thank you very much,
Bogdan

Reply via email to