>
>
>
> TLS is layer 5 so if the LB is operating at layer 4 it can't host the
> cert. Some LBs can operate at layer 5 so it will depend on your LB
> and/or its configuration.
>
> Mark
>
>
I see. That's good to know. The LB is at 7.
>
>
> Thanks for letting us know what the issue was; many people never come back
> and tell us what fixed it.
>
> My pleasure. This list is awesome.
On 01/08/2014 17:06, John Smith wrote:
> On Fri, Aug 1, 2014 at 11:54 AM, Mark Thomas wrote:
>
>> On 01/08/2014 16:30, Daniel Mikusa wrote:
>>> You probably want the SSL certificate installed on your hardware load
>>> balancer. End client's browsers are going to connect to the hardware
>> load
>
On 8/1/2014 1:33 PM, John Smith wrote:
Is your LB configured to listen on 8443, or on 443? It won't pick up the
port it's supposed to listen on from the TC instances; you have to specify
it.
Nailed it. Simplest solution, I didn't even consider it.
Thanks,
John
Thanks for letting us k
>
>
>> There is no response, since you are not even able to connect to that
> IP:port.
> If you are using the IP of the LB, then the LB is not accepting
> connections on port 8443.
> You won't get much further, unless you solve that first.
> But I thought that you wanted your users to access via p
>
>
>>
> Is your LB configured to listen on 8443, or on 443? It won't pick up the
> port it's supposed to listen on from the TC instances; you have to specify
> it.
>
>
Nailed it. Simplest solution, I didn't even consider it.
Thanks,
John
>
>
> As your testing keep this process in mind. If you encounter a problem just
> try to break down the flow from your browser to the server and back. If
> you look at the request at each hop through this process, you can often
> find where things went wrong. For example, did the request hit th
On Fri, Aug 1, 2014 at 11:49 AM, John Smith wrote:
> >
> > > TC 7.0.54 / RHEL 6
> > >
> > > I have two physical servers, each running an instance of TC. The
> servers
> > > are behind a hardware loadbalancer. IPTables is routing request on 80
> to
> > > 8080.
> >
> >
> > This seems unnecessary.
On 8/1/2014 12:35 PM, John Smith wrote:
No, I am not really going that far. I am suggesting that that may be
the kind of thing that is happening, and that you may want to investigate
with a browser plugin, that the requests/responses are really what you are
expecting.
Your initial explanatio
John Smith wrote:
No, I am not really going that far. I am suggesting that that may be
the kind of thing that is happening, and that you may want to investigate
with a browser plugin, that the requests/responses are really what you are
expecting.
Your initial explanation was a bit confusing a
>
>
>>> No, I am not really going that far. I am suggesting that that may be
> the kind of thing that is happening, and that you may want to investigate
> with a browser plugin, that the requests/responses are really what you are
> expecting.
> Your initial explanation was a bit confusing and lack
John Smith wrote:
Not contradicting anything Daniel is saying, but maybe something to add,
and maybe that's the missing part of the original puzzle :
If Tomcat is expecting HTTPS requests on port 8443, then any re-direct or
response that it is sending back is going to include that port number a
On Fri, Aug 1, 2014 at 11:54 AM, Mark Thomas wrote:
> On 01/08/2014 16:30, Daniel Mikusa wrote:
> > You probably want the SSL certificate installed on your hardware load
> > balancer. End client's browsers are going to connect to the hardware
> load
> > balancer, not Tomcat. Thus you'd want the
>> Not contradicting anything Daniel is saying, but maybe something to add,
> and maybe that's the missing part of the original puzzle :
>
> If Tomcat is expecting HTTPS requests on port 8443, then any re-direct or
> response that it is sending back is going to include that port number after
> the
On 01/08/2014 16:30, Daniel Mikusa wrote:
> You probably want the SSL certificate installed on your hardware load
> balancer. End client's browsers are going to connect to the hardware load
> balancer, not Tomcat. Thus you'd want the certificate there so your end
> users can benefit from it.
Tha
>
> > TC 7.0.54 / RHEL 6
> >
> > I have two physical servers, each running an instance of TC. The servers
> > are behind a hardware loadbalancer. IPTables is routing request on 80 to
> > 8080.
>
>
> This seems unnecessary. If you have a hardware load balancer in front of
> Tomcat, it is the only t
Daniel Mikusa wrote:
On Fri, Aug 1, 2014 at 11:13 AM, John Smith wrote:
TC 7.0.54 / RHEL 6
I have two physical servers, each running an instance of TC. The servers
are behind a hardware loadbalancer. IPTables is routing request on 80 to
8080.
This seems unnecessary. If you have a hardware
On Fri, Aug 1, 2014 at 11:13 AM, John Smith wrote:
> TC 7.0.54 / RHEL 6
>
> I have two physical servers, each running an instance of TC. The servers
> are behind a hardware loadbalancer. IPTables is routing request on 80 to
> 8080.
This seems unnecessary. If you have a hardware load balancer i
TC 7.0.54 / RHEL 6
I have two physical servers, each running an instance of TC. The servers
are behind a hardware loadbalancer. IPTables is routing request on 80 to
8080. Tomcat runs under a non-root user. All good.
I needed to protect an area of our webapp under SSL. Went ahead and
installed the
19 matches
Mail list logo