Hi Hugo,
Direct connexion to the web server on port 80 is all good but port 443 is not bring the page at all..
I tried to compare the setting of the proxy server with the setting of the end webserver but I couldn't see the problem.
Would you mind taking a look?
Proxy setting:
set LOCALHOST = 127.0.0.0/8
set MyIPv4 = 81.514.xx.xx
set TrustedIP_1 = 91.6.xx.xxx # Headquater
set TrustedIP_2 = 82.34.xxx.xxx # Office
# GENERAL SETTINGS
#
ServerString = Hiawatha
ServerId = www:www
ConnectionsTotal = 4096
ConnectionsPerIP = 25
ThreadPoolSize = 128
ThreadKillRate = 8
SystemLogfile = /var/log/hiawatha/system.log
GarbageLogfile = /var/log/hiawatha/garbage.log
CacheSize = 512
CacheMaxFilesize = 512
CacheRProxyExtensions = css, eot, gif, html, htm, ico, jpg, jpeg, js, otf, png, svg, swf, ttf, txt, woff, woff2
MaxUrlLength = 1200
MinTLSversion = 1.2
DHsize = 4096
SocketSendTimeout = 30
LogfileMask = deny LOCALHOST, deny MyIPv4, deny TrustedIP_1, deny TrustedIP_2
RequestLimitMask = deny LOCALHOST, deny MyIPv4, deny TrustedIP_1, deny TrustedIP_2
# BANNING SETTINGS
# Deny service to clients who misbehave.
#
BanOnGarbage = 300
BanOnMaxPerIP = 60
BanOnMaxReqSize = 300
BanOnWrongPassword = 6:900
BanOnSQLi = 3600
KickOnBan = yes
RebanDuringBan = yes
BanlistMask = deny LOCALHOST, deny MyIPv4, deny TrustedIP_1, deny TrustedIP_2
# COMMON GATEWAY INTERFACE (CGI) SETTINGS
# These settings can be used to run CGI applications.
#
#CGIhandler = /usr/local/bin/perl:pl
#CGIhandler = /usr/local/bin/php-cgi:php
#CGIhandler = /usr/local/bin/python:py
#CGIhandler = /usr/local/bin/ruby:rb
#CGIhandler = /usr/local/bin/ssi-cgi:shtml
#CGIextension = cgi
#
#FastCGIserver {
# FastCGIid = PHP5
# ConnectTo = 127.0.0.1:2005
# Extension = php
#}
# DEFAULT WEBSITE
# It is wise to use your IP address as the hostname of the default website
# and give it a blank webpage. By doing so, automated webscanners won't find
# your possible vulnerable website.
#
Hostname = 127.0.0.1
WebsiteRoot = /usr/local/www/hiawatha
StartFile = index.html
CustomHeader = X-Frame-Options: DENY
AccessLogfile = /var/log/hiawatha/access.log
ErrorLogfile = /var/log/hiawatha/error.log
ErrorHandler = 404:/error.cgi
Binding {
Port = 80
#Interface = MyIPv4
MaxKeepAlive = 32
TimeForRequest = 3,10
MaxRequestSize = 16000
MaxUploadSize = 16
}
Binding {
Port = 443
Interface = MyIPv4
MaxKeepAlive = 100
TimeForRequest = 5,30
TLScertFile = /usr/local/etc/hiawatha/ssl/serverkey.pem
MaxRequestSize = 512
#MaxRequestSize = 2000
#MaxUploadSize = 2
}
VirtualHost {
Hostname = www.mydomain.co.uk, mydomain.co.uk, *.mydomain.co.uk
WebsiteRoot = /var/www/empty
StartFile = index.shtml
#RequireTLS = yes,31536000
TLScertFile = /usr/local/etc/hiawatha/ssl/mydomain.key
ExecuteCGI = yes
PreventXSS = yes
PreventCSRF = yes
PreventSQLi = yes
RandomHeader = 512
ReverseProxy .* http://10.20.72.27:80 30 keep-alive
#LoginMessage = scanner.example.tld
#PasswordFile = digest:/srv/www/digest/scanner.digest
AccessLogfile = /var/log/hiawatha/mydomain.access.log
ErrorLogfile = /var/log/hiawatha/mydomain.error.log
}
Note: serverkey.pem is a self sign cert
mydomain server setting:
set LOCALHOST = 127.0.0.0/8
set MyIPv4 = 10.20.72.27
set TrustedIP_1 = 91.6.xx.xxx # Headquater
set TrustedIP_2 = 82.34.xxx.xxx # Office
set TrustedIP_3 = 81.514.xx.xx # proxy server
# GENERAL SETTINGS
#
ServerString = Hiawatha
ServerId = www:www
ConnectionsTotal = 4096
ConnectionsPerIP = 32
SystemLogfile = /var/log/hiawatha/system.log
GarbageLogfile = /var/log/hiawatha/garbage.log
ThreadKillRate = 10
CacheSize = 8
CacheMaxFilesize = 512
MaxUrlLength = 1000
MinTLSversion = 1.2
DHsize = 4096
SocketSendTimeout = 30
LogfileMask = deny LOCALHOST, deny MyIPv4, deny TrustedIP_1, deny TrustedIP_2, deny TrustedIP_3
RequestLimitMask = deny LOCALHOST, deny MyIPv4, deny TrustedIP_1, deny TrustedIP_2, deny TrustedIP_3
Binding {
Port = 80
Interface = MyIPv4
MaxKeepAlive = 100
TimeForRequest = 5,15
MaxRequestSize = 2000
MaxUploadSize = 2
}
Binding {
Port = 443
Interface = MyIPv4
MaxKeepAlive = 100
TimeForRequest = 5,15
TLScertFile = /usr/local/etc/hiawatha/ssl/mydomain.key
MaxRequestSize = 2000
MaxUploadSize = 2
}
# BANNING SETTINGS
# Deny service to clients who misbehave.
#
BanOnGarbage = 300
BanOnInvalidURL = 60
BanOnMaxPerIP = 15
BanOnMaxReqSize = 300
BanOnWrongPassword = 3:900
BanOnSQLi = 3600
KickOnBan = yes
RebanDuringBan = yes
BanlistMask = deny LOCALHOST, deny MyIPv4, deny TrustedIP_1, deny TrustedIP_2, deny TrustedIP_3
ChallengeClient = 768, javascript, 15
# COMMON GATEWAY INTERFACE (CGI) SETTINGS
#
CGIhandler = /usr/local/bin/ssi-cgi:shtml
# DEFAULT WEBSITE
# Use IP address as the hostname of the default website and give it a blank webpage.
# By doing so, automated webscanners won't find the possible vulnerable website.
#
Hostname = 127.0.0.1
WebsiteRoot = /usr/local/www/hiawatha
StartFile = index.html
AccessLogfile = /usr/local/www/default/logs/default.access.log
ErrorLogfile = /usr/local/www/default/logs/default.error.log
#ErrorHandler = 404:/error.cgi
VirtualHost {
Hostname = mydomain.co.uk, www.mydomain.co.uk
WebsiteRoot = /usr/local/www/development/httpdocs
StartFile = index.shtml
#RequireTLS = yes
TLScertFile = /usr/local/etc/hiawatha/ssl/mydomain.key
AccessLogfile = /usr/local/www/development/logs/default.access.log
ErrorLogfile = /usr/local/www/development/logs/default.error.log
TimeForCGI = 15
DenyBody = ^.*%3Cscript.*%3C%2Fscript%3E.*$
ExecuteCGI = yes
PreventCSRF = yes
PreventSQLi = yes
PreventXSS = yes
}
Note: mydomain.key is a proper certificate issued by ca
Thank you in advance