Skip to content
This repository has been archived by the owner on Mar 1, 2021. It is now read-only.

problem after upgrade from 0.2 to 0.3 #4

Open
janmojzis opened this issue Sep 17, 2016 · 0 comments
Open

problem after upgrade from 0.2 to 0.3 #4

janmojzis opened this issue Sep 17, 2016 · 0 comments

Comments

@janmojzis
Copy link

Hello,
I'm running titus 0.2 under linux Debian Jessie AMD64 (with no problems).
After upgrade to 0.3, titus fails:
System error in child: read: backend_sock: Transport endpoint is not connected
Child 20969 exited with status 3
System error in child: read: backend_sock: Transport endpoint is not connected
Child 20970 exited with status 3
System error in child: read: backend_sock: Transport endpoint is not connected
Child 20971 exited with status 3

Titus raises an exception here:
https://github.com/AGWA/titus/blob/master/child.cpp#L453

Configuration file (sligthly modified configuration file from /usr/share/doc/titus/examples/titus.conf):

Which port to listen on

port 443

Run in transparent proxy mode (see titus(8) man page)?

transparent no

Address of backend application

backend 127.0.0.1
backend-port 443

Minimum number of children to keep running waiting for connections

min-spare-children 3

Maximum number of children (i.e. connections) at once

max-children 100

Maximum time (in seconds) that TLS handshake may take

max-handshake-time 10

TLS key and certificate

key /etc/ssl/private/example.com.key
cert /etc/ssl/certs/example.com.crt

TLS settings (see titus(8) man page)

ciphers ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:CAMELLIA256-SHA:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-CAMELLIA128-SHA:AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:CAMELLIA128-SHA:ECDHE-RSA-RC4-SHA:RC4-SHA

dhgroup 14

ecdhcurve secp521r1

compression no

sslv3 no

tlsv1 yes

tlsv1.1 yes

tlsv1.2 yes

honor-client-cipher-order no

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant