[SOLVED] Create encrypted connection to Proxmox WebUI via public domain

Bugbear

Member
Dec 29, 2020
37
5
13
Hi,

I want to setup a Proxmox instance, so that it is accessable via a public domain, by going to https://pve.domain.com, logging in and using it, as you would do it under it's local IP e.g. https://10.0.1.2:8006.

One special thing to mention, is that between my Router (port forwarding) and the Proxmox Server there's an Apache Webserver, serving as a proxy for different domain names, by routing the domains to the corresponding IPs and Ports.

In this case:
WWW -> Router : Port443 -> ReverseProxy : vHost,pve.domain.com -> Proxmox Server (https://10.0.1.2:8006)

Enough theory. So what I actually did was:

1.) On my registrars website I setup a DNS record for pve.domain.com pointing to my public IP
2.) On the Router I setup port forwarding for port 80 and 443 to my Proxy Server
3.) On the Proxy Server I setup a Reverse Proxy for pve.domain.com to redirect to the Proxmox WebUI, and created a Let's Encrypt SSL certificate:

Code:
sudo vi /etc/apache2/sites-available/pve.domain.com.conf
sudo a2enmod proxy_http ssl
sudo a2ensite pve.domain.com
sudo systemctl restart apache2

Code:
sudo certbot --apache --agree-tos --redirect --register-unsafely-without-email --hsts -d pve.domain.com
Output:
Code:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Congratulations! You have successfully enabled https://pve.domain.com

You should test your configuration at:
https://www.ssllabs.com/ssltest/analyze.html?d=pve.domain.com
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Virtual Host:
Code:
<VirtualHost *:80>
        ServerName pve.domain.com

        CustomLog ${APACHE_LOG_DIR}/access.log combined
        ErrorLog ${APACHE_LOG_DIR}/error.log

        ProxyPass / http://10.0.1.2:80/
        ProxyPassReverse / http://10.0.1.2:80/
</VirtualHost>

<VirtualHost *:443>
        ServerName pve.domain.com

        CustomLog ${APACHE_LOG_DIR}/access.log combined
        ErrorLog ${APACHE_LOG_DIR}/error.log

        ProxyPass / https://10.0.1.2:8006/
        ProxyPassReverse / https://10.0.1.2:8006/

        SSLProxyCheckPeerCN off
        SSLProxyCheckPeerExpire off
        SSLProxyCheckPeerName off
        SSLProxyEngine on
        SSLProxyVerify none
SSLCertificateFile /etc/letsencrypt/live/pve.domain.com/fullchain.pem
SSLCertificateKeyFile /etc/letsencrypt/live/pve.domain.com/privkey.pem
Include /etc/letsencrypt/options-ssl-apache.conf
Header always set Strict-Transport-Security "max-age=31536000"
</VirtualHost>

That's it, I thought. At least that's the way I've done it on every other service till now.

Going to https://pve.domain.com establishes an ecrypted connection (Verified by: Let's Encrypt | view Certificate)
Logging into the Proxmox WebUI works too, and all the site-content is loaded susccsessfully:

proxmox01.jpg

But the problem I have, is that I can't open a single console inside the WebUI. Neither the console of the host (name: Morpheus; error: "undefinded (code: 1006)") nor those of the VMs (no matter wether noVNC or xterm.js).
Going to https://10.0.1.2:8006 and opening the consoles at the exact same time works perfectly fine:

proxmox02.jpg

I highly suspect, that this is a security mechanism and has something to do with the Proxmox self-signed certificate and therefore the browser warning when you go to https://10.0.1.2:8006, that I've bypassed with my solution:

proxmox03.PNG

I tried solving this issue today, but I had no success, whatsoever. What is the exact reason for this issue and what suggestions do you have for solving it?
 
Last edited:
Here is my reverse proxy config, all be it in Nginx:
Code:
#
## Handle requests for pve.domain.com under HTTPS.
#

server
{
        listen          443 ssl;
        server_name     pve.domain.com;

        add_header Strict-Transport-Security "max-age=31536000" always;
        add_header Allow "GET, POST, HEAD, PUT, DELETE" always;

        if ($request_method !~ ^(GET|POST|HEAD|PUT|DELETE)$)
        {
                return 405;
        }

    include errorpages.conf;

        location /
        {
        allow 10.0.0.0/8;    # Allow all internal networks
        deny all;        # Deny all other networks

                proxy_pass https://10.120.10.101:8006;
                proxy_ssl_verify off;

                proxy_buffering off;
                proxy_buffer_size 4k;

                client_max_body_size 5g;

                proxy_connect_timeout 300s;
                proxy_read_timeout 300s;

                send_timeout 300s;

                proxy_http_version 1.1;
                proxy_set_header Upgrade $http_upgrade;
                proxy_set_header Connection "upgrade";

                proxy_set_header Host $host;
                proxy_set_header X-Real-IP $remote_addr;
                proxy_set_header X-Forwarded-Host $server_name;
                proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;

                proxy_set_header X-Forwarded-Proto $scheme;
                proxy_set_header X-Forwarded-Ssl on;
        }

        ssl_certificate /root/certificates/domain.com/fullchain.cer;
        ssl_certificate_key /root/certificates/domain.com/domain.com.key;
}

The only thing I have yet to change is to add the other nodes into the backend to allow me to connect from any available node.
 
Thank you or your config Astraea, but unfortunately I cannot find anything in there, which would help.
It's strange to me, because the SSL connection could obviously be established successfully ...
 
proxmox-devconsole.jpg
That's the output in the Developer Console of Firefox, when trying to open the noVNC console in Proxmox.
 
Short follow up:
In the the websockets used for displaying the concole are causing the issue.
You can solve this by adding the following to your VirtualHost:
Code:
    # Passtrough websocket for noVNC web-console
    ProxyPass / wss://10.0.1.10:8006/
    ProxyPassReverse / wss://10.0.1.10:8006/

And eventually loading the corresponding modules:
Code:
sudo a2enmod proxy_http proxy_wstunnel headers rewrite ssl & sudo systemctl restart apache2
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!