[Help Needed]: Although the below solution works, I still want to make nginx stream proxy transparent. Currently it's non transparent, so in H@H's log all source IPs becomes 127.0.0.1, which looks ugly.
Managed to let H@H coexist with other sites on the server with nginx's TCP forwarding (haproxy, LVS and other load balancers should be able to do the same or better). A bit cleaner than the iptables port redir approach (more overhead though, but I only have one IP lol).
I appended the following stream block to my nginx.conf:
CODE
stream {
# http://nginx.org/en/docs/http/ngx_http_map_module.html#map
map $ssl_preread_server_name $name {
hostnames;
keepalive 10;
proxy_buffer_size 600k;
default others;
*.hath.network hath;
*.other.domain others;
}
upstream others {
server [::]:443;
}
upstream hath {
server 0.0:7777; # replace 7777 with your H@H port specified on java -jar ... --port=777 --disable-ip-origin-check; on the H@H web config, use 443.
}
server {
listen 0.0:443;
proxy_pass $name;
# https://nginx.org/en/docs/stream/ngx_stream_proxy_module.html#proxy_bind
#proxy_bind $remote_addr transparent;
# http://nginx.org/en/docs/stream/ngx_stream_ssl_preread_module.html
ssl_preread on;
}
}
The downside is that we have to change other sites to run on [::]:443.
This TCP forwarder will operate on 0.0.0.0:443 (ipv4 only because H@H is ipv4 only). Additionally, to be able to select a hostname among all the HTTPS connections, we need to preread the headers in the SSL stream, which sets the variable $ssl_preread_server_name automatically. We then can switch upstreams based on that. The port 10443 or [::]:443 can still be shared by multiple sites.
Please point out if there is any easier/cleaner way to do a transparent HTTPS reverse proxy (given the .p12 remains secret, though pointless)!
-- Update 1 --
Added `proxy_bind $remote_addr transparent;` so `--disable-ip-origin-check` should no longer be needed.
-- Update 2 --
Commented out `proxy_bind $remote_addr transparent;`. Certainly I misinterpreted how this clause works. `--disable-ip-origin-check` is still needed for the code above.
-- Update 3 --
From reading [
www.haproxy.com]
https://www.haproxy.com/blog/howto-transpar...-load-balancer/, it turned out that multiple parts of the network stack need to be engaged. It's my first time setting this up with nginx stream but I will keep trying when I have time.
Kernel doc on transparent proxy support: [
www.kernel.org]
https://www.kernel.org/doc/Documentation/ne...king/tproxy.txt-- Update 4 --
Added keepalive in upstreams for (much?) better performance.
-- Update 5 --
I was using openjdk 13 and the quality dropped to 3k from 9k (QAQ).
-- Update 6 --
Okay the quality is back.
Now I am using
CODE
java -Dhttps.protocols="TLSv1,TLSv1.1,TLSv1.2" -Djdk.tls.client.protocols="TLSv1,TLSv1.1,TLSv1.2" -jar HentaiAtHome.jar --disable-ip-origin-check --port=xxxx
thanks to 0xDEADC0DE, and the quality is climbing back up. Even though in 1.5.3, TLSv1.3 is disabled in HTTPServer.java#105, the command line options (JAVA_OPTS) are still needed for the quality to be high. Not sure if client performance will change though.
-- Update 7 --
Added `proxy_buffer_size` and simplified the config. Obviously a [::]:443 upstream works on ipv4-only servers.
This post has been edited by Drawer L: Nov 18 2019, 06:21