mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-26 01:45:54 +03:00
[GH-ISSUE #817] Status of "Strict" HTTPS Support (e.g., at Cloudflare) #692
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#692
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @johntdavis84 on GitHub (Jan 10, 2021).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/817
What is troubling you?
Hello, I wanted to clarify whether it was still a bad idea or not to use the "strict" TLS option available e.g., from Cloudflare. Cloudflare wants me to use it:
The installation and setup tutorial videos for NPM I watched recommended leaving this off, as Strict mode could cause some issues with NPM that might cause it not to work correctly. I got the impression it might work fine sometimes and might not work fine other times, so leaving it on could sort of create a ¯_(ツ)_/¯ situation.
These tutorial videos were at least 6 months old, and there've been at least a couple bug fix releases since then, so I wanted to clarify whether sticking with Full vs. Strict is still the best practice.
(Yes, I could just experiment and figure this out myself, but I couldn't find anything on this when I searched so I thought it might be useful to post.)
@henkisdabro commented on GitHub (Jan 11, 2021):
I'm using Cloudflare's strict settings after creating letsencrypt SSL certificates used on all my Proxy Hosts in npm, works fine for me.
@johntdavis84 commented on GitHub (Jan 11, 2021):
Thanks! Did you switch to strict after creation of the certs because it would have been a problem to use strict during creation?
I'm not done rolling out proxy hosts yet, so I'm curious if I should wait.
@henkisdabro commented on GitHub (Jan 11, 2021):
Well, you can leave the Cloudflare SSL setting at stric all the time, but on the individual A or CNAME record for your subdomain or domain you need them set the "DNS only" - the grey color cloud - temporarily during initial SSL issuing on npm. Once issued, then switch the A or CNAME record over to orange cloud to become proxied which effectively take on the SSL settings of strict that you have set on your zone.
@johntdavis84 commented on GitHub (Jan 11, 2021):
Excellent! This is perfect.
Thanks!
John T Davis
@henkisdabro commented on GitHub (Jan 12, 2021):
That said, I can't confirm whether there are any other issues with Cloudflare's "Strict" SSL settings like you mentioned in all use cases within NPM, I'm just using simple proxy hosts to internal (docker container) services that I'm running, including; nginx webserver, wordpress, media server related, pi-hole and other things – and in these cases I have not experienced problems – hope other people can chime in as well with their results.
@johntdavis84 commented on GitHub (Jan 14, 2021):
I appreciate the warning. I'm doing the exact same thing (NPM --> internal containerized services). It seems to be working fine with strict TLS.
I still don't completely understand the other options (e.g., stream), so I haven't experimented with them yet.