Hello Jim,

Thanks for the warning!

In my case the HTTP traffic is only between the reverse proxy and a virtual 
machine running on the same host.
With my knowledge the traffic can only be intercepted when someone breaks into 
my system. It's a personal cloud service and I don't think many people are 
interested in it.

I'm talking about this set-up:
https://jeroenverhoeckx.com/build-your-own-personal-cloud.html

So, I think I'm relatively safe :-) .

Jeroen

--------------------------------------------------------
Support the independent web, use 
[Firefox](https://www.mozilla.org/en-US/firefox/new/)

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Thursday, January 13th, 2022 at 11:34 PM, Jim Albert <j...@netrition.com> 
wrote:

> With regard to:
> reverse proxy --> HTTP --> back-end server
> and in respect to the sensitivity of your requests and responses, you might 
> want to consider any security implications or if this violates any compliance 
> requirements depending on the proximity of your proxy to your back-end 
> server. It's likely the proxy -> back-end server stays within a very tight 
> environment. However, that request and response is traveling some segment of 
> network whether physical or virtual and likely only yours, unencrypted or 
> perhaps protected at most by VPN encryption.
>
> On 1/13/2022 5:05 PM, Jeroen Verhoeckx wrote:
>
>> Hello Dino / HTH,
>>
>> Thank you for your very elaborate answer!!
>>
>> Your 'diagram' made it very clear!
>> Clients --> INTERNET --> Apache httpd reverse proxy (answer to HTTPS 
>> requests made by your clients) --> Your internal backend(s) (answer to HTTPS 
>> requests coming from your proxy).
>>
>> It's also good to know that I set-up my reverse proxy in the correct way 
>> (only installing the SSL certificates on the reverse proxy).
>> My set-up is: Clients --> HTTPS - -> reverse proxy --> HTTP --> back-end 
>> server
>>
>> There is no need in my set-up to use HTTPS between the reverse proxy and the 
>> back-end server.
>>
>> Thanks for clarification!
>>
>> Jeroen
>>
>> --------------------------------------------------------
>> Support the independent web, use 
>> [Firefox](https://www.mozilla.org/en-US/firefox/new/)
>>
>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>> On Thursday, January 13th, 2022 at 7:15 PM, Dino Ciuffetti 
>> [<d...@tuxweb.it>](mailto:d...@tuxweb.it) wrote:
>>
>>> Apache httpd works at layer 7 (HTTP/HTTPS).
>>> You CANNOT have a reverse proxy at layer 4 with apache httpd where the X509 
>>> certificates are only needed on your backends (like HAProxy does).
>>>
>>> Clients --> INTERNET --> Apache httpd reverse proxy (answer to HTTPS 
>>> requests made by your clients) --> Your internal backend(s) (answer to 
>>> HTTPS requests coming from your proxy).
>>>
>>> The traffic between your internet clients and apache httpd is protected via 
>>> TLS protocol (HTTPS) so you need a X509 certificate and its private key on 
>>> your httpd public facing reverse proxy virtual host to terminate TLS 
>>> internet traffic to your reverse proxy.
>>>
>>> If you also want your reverse proxy to talk to your internal backend(s) via 
>>> HTTPS you also need a X509 certificate and private key on your HTTPS 
>>> backend servers.
>>>
>>> RECAP: You will need a certificate released by a public (known to all major 
>>> browsers) Certification Authority for your reverse proxy and a certificate 
>>> released by a private Certification Authority (only known by your proxy and 
>>> your backends) on your backends. You could even use self signed 
>>> certificates on your private side, or mantain a private CA by yourself via 
>>> openssl.
>>>
>>> HTH
>>>
>>> 13 gennaio 2022 12:58, "Jeroen Verhoeckx" 
>>> <[j.verhoe...@protonmail.com.invalid](mailto:j.verhoe...@protonmail.com.invalid?to=%22Jeroen%20Verhoeckx%22%20<j.verhoe...@protonmail.com.invalid>)>
>>>  wrote:
>>>
>>>> Thanks, great to know that it is possible!
>>>>
>>>> You write that you need to install the SSL certificates on both the 
>>>> reverse proxy and in the virtual machine (or another local server)?
>>>> Is that really necessary? I try to avoid duplication whenever that is 
>>>> possible.
>>>>
>>>> Do you have an example set-up somewhere?
>>>>
>>>> Thanks!!
>>>>
>>>> --------------------------------------------------------
>>>> Support the independent web, use 
>>>> [Firefox](https://www.mozilla.org/en-US/firefox/new/)
>>>>
>>>> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>>>> On Wednesday, January 12th, 2022 at 5:23 PM, Dino Ciuffetti 
>>>> <d...@tuxweb.it> wrote:
>>>>
>>>>>> My question:
>>>>>> Would it have been possible to install the SSL certificates in the 
>>>>>> virtual machines?
>>>>>
>>>>> YES. It's possibile to send Internet HTTPS traffic to an internal HTTPS 
>>>>> service behind apache httpd as a reverse proxy.
>>>>> You eventally need to install same SSL certificates (but you don't have 
>>>>> to necessarily) on both the reverse proxy and the internal service, 
>>>>> enable SSLProxyProtol on your VHs and send the traffic to HTTPS via your 
>>>>> ProxyPass.

Reply via email to