An update,

I have had a chance to start Relayd with verbose logging to troubleshoot this, and I get the following on startup with any FQDN longer than 32 characters in relayd.conf (config details are the same as in my previous email):

SSL library error: ****************.************.com: relay_ssl_ctx_create: error:140DB111:SSL routines:SSL_CTX_set_session_id_context:ssl session id context too long
fatal: relay_init: failed to create SSL context: Invalid argument

It doesn't look like there's a hard limit for FQDN length in the source for relayd, anybody have any ideas?

Thanks,

Andrew Klettke
Systems Admin
Optic Fusion NOC
253-830-2943


On 02/04/2011 04:04 PM, Andrew Klettke wrote:
Hello all,

It looks like we've run into a limit for the length of a SSL hostname in relayd.

If we define a relay with a hostname that is longer than 32 characters, we get the following: Feb 1 22:14:00 fw02 relayd[22062]: fatal: relay_init: failed to create SSL context: No buffer space available

However, shorter hostnames do not cause relayd to throw the error. We've tested this with multiple domain names.

Is this an expected behavior of relayd?


Here is the defined protocol and the relay giving us the issue in relayd.conf (FQDN censored):


http protocol "httpsfilter" {
    tcp { nodelay, sack, socket buffer 65536, backlog 100 }
    return error

        header append "$REMOTE_ADDR" to "X-Forwarded-For"
        header append "$SERVER_ADDR:$SERVER_PORT" to "X-Forwarded-By"
        header change "Keep-Alive" to "$TIMEOUT"

ssl { sslv3, tlsv1, no sslv2, ciphers "HIGH:MEDIUM:!aNULL:+SHA1:+MD5:+HIGH:+MEDIUM" }
}

relay "****************.************.com" {
    listen on "****************.************.com" port 443 ssl
    protocol "httpsfilter"
forward to <web_hosts> port 443 mode loadbalance check http "/" code 200
}

Reply via email to