"No server name provided" error when traffic is coming from AWS LB #170
-
|
Hey! I have setup that looks like this: I want to be able to encrypt traffic between AWS LB and EC2 instance, which is possible according to AWS docs:
I've installed my own self-signed certificates as described in kamal's docs. I am mainly interested in the root cause. I have few options:
Similar discussion has been opened, but no response was provided: #58 Thanks! |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
|
@egor-khanko it sounds like option 2: the AWS LB is not using SNI to supply the server name. The current Kamal Proxy release will only serve TLS traffic when using SNI. I actually ran into the same problem myself recently, and have been testing a simple fix for it which seems to work quite well. I'll try to get a new release out soon with this solution, and I expect that will solve the problem for you. (The patch I've been testing simple defaults to the first configured server name when there's no SNI. That seems fine for many cases, but we could make this more explicit by exposing it as a |
Beta Was this translation helpful? Give feedback.
-
|
@kevinmcconnell This patch would be very helpful, thank you! Initial issue solved with a fix, so happily closing discussion! |
Beta Was this translation helpful? Give feedback.
@egor-khanko it sounds like option 2: the AWS LB is not using SNI to supply the server name. The current Kamal Proxy release will only serve TLS traffic when using SNI.
I actually ran into the same problem myself recently, and have been testing a simple fix for it which seems to work quite well. I'll try to get a new release out soon with this solution, and I expect that will solve the problem for you.
(The patch I've been testing simple defaults to the first configured server name when there's no SNI. That seems fine for many cases, but we could make this more explicit by exposing it as a
--default-tls-server-nameoption.)