[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Load balancer and Security Certificates
Tim Ross wrote:
Hi All,
We are working through our move to Zimbra here at Cal Poly and have
run into a little snag with Security Certs. Initially we had wanted
to use the http proxy that came out with Zimbra 5.0.5, but even in
5.0.6 and 5.0.7 the web proxy still has a few issues that make it
unusable for us. So, we are using a load balancer in front of two
mailstore servers in our Test environment. We have a VIP
(example.calpoly.edu) that the load balancer responds to on port 443.
We have a security cert for example.calpoly.edu on the load balancer
that works fine. The load balancer then chooses one of the two mail
servers (by least connections) and forwards the connection request to
the mailstores. We have tried a couple different setups with the load
balancer and mail servers and even purchased two Thawte certs for the
two machine names on the mailstores. The two things we are trying to
accomplish are keeping a https (443) connection to the mailstore
servers and not receiving cert warnings in the browsers. We have
tried terminating SSL on the load balancer and using
zimbraMailMode=redirect on the mail servers, and we've also tried just
passing the connection through the load balancer on 443 to the
mailstore servers. Each way we still receive cert warnings if you are
directed to the mailstore server that does not contain your mailbox
and you are redirected by Zimbra to the other mailstore server. The
cert warning happens because the connection comes in as
example.calpoly.edu and the box is expecting the machine name on the
cert. We thought that buying Thawte certs with the box names might
resolve this issue, but it did not.
Have any of you dealt with this issue and found the magic combination
or setting? We are considering perhaps a virtual host on the
mailstores that would tell the box that it should respond to
example.calpoly.edu requests. Another possibility was putting
example.calpoly.edu in the "Subject Alternative Name" field on the CSR
we generate for the Thawte cert.
Not that it is the most graceful solution to your problem, but we
switched to using a single wildcard cert '*.findlay.edu' about a year
ago, and it has been wonderful. No reports of clients not accepting it,
saved a whole bunch of money versus thawte, and it doesn't expire for 3
years. The provider we chose was Digicert, who seemed like the only one
that would license the cert for use on unlimited servers (another one we
looked at was also a wildcard, but you were supposed to license it per
server.. good for vhosting I guess).
The only downside I found is that the cert isn't signed directly by a
root ca cert included with browsers. (Keep reading, it turns out OK.)
But instead, a browser included root ca cert (entrust) signed digicert's
root ca cert, which signed ours. So, in configuring web servers and
such for the cert, you have to include the entire chain. The browser
follows the chain up to a root ca cert that it trusts, so all is well.
It's slightly more difficult, but still not tough. If you want an
example, https://www.findlay.edu uses that cert, so you can look at the
details and check out the chain.
http://www.digicert.com/wildcard-ssl-certificates.htm is their site (no,
I really not a salesman, I've just been very happy with it).
Ooh.. just saw Steve Hillman's reply of the same thing. lol. OK,
enough selling. :)
Ryan
begin:vcard
fn:Ryan Fox
n:Fox;Ryan
org:The University of Findlay;Information Technology Services
adr:128 Old Main;;1000 Main St;Findlay;OH;45840;USA
email;internet:rfox@findlay.edu
title:Network Systems Manager
tel;work:419-434-4348
x-mozilla-html:TRUE
version:2.1
end:vcard