Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

http/https splitting for monolithic #51

Closed
MK-42 opened this issue Aug 25, 2019 · 3 comments
Closed

http/https splitting for monolithic #51

MK-42 opened this issue Aug 25, 2019 · 3 comments
Labels
for-reference Information or reference material that doesn't currently require any next steps inactive Issue appears to be inactive wontfix This will not be worked on

Comments

@MK-42
Copy link

MK-42 commented Aug 25, 2019

Describe the issue you are having

I'm currently investigating to switch to /monolithic from a /docker-compose like setup with multiple /generic instances

DNS Configuration

self-written powershell scripts to preload windows-server dns with the required dns redirects

As I'm in a windows-domain environment, I'm easily able to roll out trusted https certificates fof effective mitm caching of ssl content.
Currently I'm running the caching services on two different IPs, one for http only content, no ssl-certificates in nginx, and sni-proxy (just in case), and another IP that is running the nginx vhosts equipped with ssl certs, for origin and the likes.

I'm wondering how to adapt this setup to /monolithic. Are there any experiences regarding simply caching all the http/https traffic on the cdns listed by uklans/cache-domains, or should I explicitly whiltelist some of the services to ssl caching and route the rest through sni-proxy? I think I could achieve the latter by enrolling two IPs to the /monolithic container, listening in 80/443 on one, and listening on 80 with a running sni-proxy on the other IP.
Then binding these to different sets of host ips and using the according dns records for proper selection of ssl vs non-ssl caching for each cdn.

Are there any best-practices or known problems regarding such setups?

@Lepidopterist
Copy link
Member

Hey @MK-42 ,

I'm not aware of any instances where this has been done. We like to try to steer away from MITM on SSL because the most common use-case for this does not lend itself to interception. (LAN parties with no end-user device control).

That being said, I can't see a glaring reason it wouldn't work. Feedback would most likely be appreciated by others who have a similar use case, if you do manage to get it working!.

Hopefully, Origin will be resolved soon - there have been whispers in the wind that may bear positive news :)

@MK-42
Copy link
Author

MK-42 commented Aug 30, 2019

Hopefully, Origin will be resolved soon - there have been whispers in the wind that may bear positive news :)

That sounds really promising. I was in a mixed happy/sad state when ssl caching was working back in spring and I realized that epic switched to non-ssl traffic making the effort obsolete right away. But as long as Origin is ssl, we will need a solution for that anyway.

Thanks alot for your effort here, this project is amazing!

@unspec unspec added for-reference Information or reference material that doesn't currently require any next steps inactive Issue appears to be inactive wontfix This will not be worked on labels Feb 22, 2020
@unspec
Copy link
Member

unspec commented Feb 22, 2020

Closing this issue, as no specific issue outstanding. Feel free to reopen with any specific questions / issues per advice from Lepidopterist.

The Origin issue specifically is being tracked here: uklans/cache-domains#98 if you want to follow that for updates.

@unspec unspec closed this as completed Feb 22, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
for-reference Information or reference material that doesn't currently require any next steps inactive Issue appears to be inactive wontfix This will not be worked on
Projects
None yet
Development

No branches or pull requests

3 participants