mirror of
https://github.com/fatedier/frp.git
synced 2026-05-15 08:05:49 -06:00
[GH-ISSUE #3915] Unable to get https reverse tunnel working #3105
Labels
No labels
In Progress
WIP
WaitingForInfo
bug
doc
duplicate
easy
enhancement
future
help wanted
invalid
lifecycle/stale
need-issue-template
need-usage-help
no plan
proposal
pull-request
question
todo
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/frp#3105
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Chuckame on GitHub (Jan 7, 2024).
Original GitHub issue: https://github.com/fatedier/frp/issues/3915
Bug Description
When having Caddy as frontend reverse proxy, forwarding traffic to an https client is not working. The traffic is going to the home caddy instance, but showing an error (
TLS handshake error from 172.19.0.3:48122: no certificate available for '172.19.0.6').Here is the infrastructure:
frpc Version
0.53.2
frps Version
0.53.2
System Architecture
linux/amd64
Configurations
caddy (server):
server:
client:
caddy (client):
Logs
server:
client:
home caddy logs:
Steps to reproduce
Affected area
@Chuckame commented on GitHub (Jan 7, 2024):
Kind of solved (hours passed on it...): I needed the frps container with a dns alias to the same as the request hostname, and remote caddy must target this dns alias instead of the IP.
It would be great that frp sets this hostname automagically, because I don't know how to do with wildcards.
@fatedier commented on GitHub (Jan 8, 2024):
Obviously, you should configure the correct SNI name (host) for caddy to forward HTTPS requests, rather than using the IP. I think this is a common configuration for reverse proxy functionality.
For https, frps has no modifications to the request.
@Chuckame commented on GitHub (Jan 8, 2024):
I fixed it with overriding the SNI... The param and the workflow is not that clear when we are new to tls/https world.