Mondoze Knowledge Base

Search our articles or browse by category below

Using Railgun with Origin CA Certificates

Last modified: October 5, 2022
You are here:
Estimated reading time: 1 min

How To Use Railgun with Origin CA Certificates

While using Railgun and configuring Origin CA certificates, please note that additional steps are need to avoid service impact for HTTPS requests being sent from the Listener. To the site’s origin (where the origin CA certificates are install). 

This is due to the default that trust to store that is ship with the Railgun listener. Being a identical copy of the root certificates that it trusts (identical to what NSS/Mozilla trusts).

This means that when enabling Full SSL (Strict) in the dashboard while Railgun is enable.The Listener will no longer consider the origin presenting the Origin CA certificate as trustworthy. Resulting in a 520 error.

* Please note that this error condition will only occur if validate.cert is enabled (i.e. set to 1) from the railgun.conf file.

Here is an example of the error generated when validate.cert = 1, the origin uses an Origin CA leaf, and the Origin CA roots are not in the trust store for Railgun specified by ca.bundle:

rg-listener: [2a074d8b36f00000-ATL] www.example.com origin request failed 123.123.123.123:443 to %!!(MISSING)s(MISSING): x509: certificate signed by unknown authority

Here are the following options available to avoid these errors:

1.    Set validate.cert = 0 in the railgun.conf file

2. Add Cloudflare’s origin CA root certificates to the trust store specified in the ca.bundle parameter in the railgun.conf. This can be done by a simply adding these root certificates at the end of the file using a text editor.

By default, railgun.conf defines the Listener’s trust store as (for Debian/Ubuntu):
ca.bundle = /etc/ssl/railgun-ca-certs.crt

*As a reminder, the listener will need to be restart after making changes to the configuration file.

Was this article helpful?
Dislike 0
Views: 53