Haproxy: SSL encrypted backend with self-signed cert
Solution 1:
The question is not really linked to HAProxy
, but to managing certs and certificate authorities in general.
Not sure which OS you're using, because you didn't state this, but if it's some Linux flavor (albeit the following applies to Debian
and derivatives):
-
Make sure you've the package
ca-certificates
installed. -
You're creating your certs using your own certificate authority (ca).
-
Take the
your ca root cert
of this ca and put it inside/usr/local/share/ca-certificates/name-of-your-ca/
. (You might have to create the foldername-of-your-ca
by yourself.) Ensure theyour ca root cert
has a.crt
extension.(By default,
/usr/local/share/ca-certificates/
is owned byroot:staff
, so usesudo
orroot
to do this.) -
Execute
update-ca-certificates
(viasudo
/ asroot
). -
After execution, there should be a file
/etc/ssl/cert/your-ca-root.pem
symlinked to/usr/local/share/ca-certificates/name-of-your-ca/your-ca-root.crt
. -
Enable verification in
HAProxy
and profit.