I'm sorry for not including the logs and some analysis. However, it turns out the log didn't tell much either.
partial log:
time="2019-11-05T02:06:19Z" level=debug msg="http: TLS handshake error from 64.41.200.102:42720: tls: client offered only unsupported versions: [300]"
time="2019-11-05T02:06:19Z" level=debug msg="Serving default certificate for request: \"\""
time="2019-11-05T02:06:19Z" level=debug msg="http: TLS handshake error from 64.41.200.102:42820: EOF"
time="2019-11-05T02:06:19Z" level=debug msg="http: TLS handshake error from 64.41.200.102:42890: tls: client offered only unsupported versions: [301 300]"
time="2019-11-05T02:06:20Z" level=debug msg="http: TLS handshake error from 64.41.200.102:42978: tls: client offered only unsupported versions: [302 301 300]"
time="2019-11-05T02:06:20Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43074: tls: client offered only unsupported versions: [303 302 301 300]"
time="2019-11-05T02:06:20Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43172: tls: client offered only unsupported versions: [303 302 301 300]"
time="2019-11-05T02:06:21Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43286: read tcp 172.19.0.2:443->64.41.200.102:43286: read: connection reset by peer"
time="2019-11-05T02:06:21Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43436: tls: client offered only unsupported versions: [301 300]"
time="2019-11-05T02:06:22Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43502: tls: client offered only unsupported versions: [301 300]"
time="2019-11-05T02:06:22Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43596: tls: client offered only unsupported versions: [303 302 301 300]"
time="2019-11-05T02:06:22Z" level=debug msg="Serving default certificate for request: \"sni-test.ssllabs.com\""
time="2019-11-05T02:06:22Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43690: EOF"
time="2019-11-05T02:06:23Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43788: tls: client offered only unsupported versions: [301 300]"
time="2019-11-05T02:06:23Z" level=debug msg="Serving default certificate for request: \"\""
time="2019-11-05T02:06:23Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43866: EOF"
time="2019-11-05T02:06:23Z" level=debug msg="http: TLS handshake error from 64.41.200.102:43944: tls: client offered only unsupported versions: [301 300]"
time="2019-11-05T02:06:24Z" level=debug msg="http: TLS handshake error from 64.41.200.102:44026: tls: client offered only unsupported versions: [301 300]"
time="2019-11-05T02:06:25Z" level=debug msg="vulcand/oxy/roundrobin/rr: begin ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"Connection\":[\"Close\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\"],\"X-Forwarded-Host\":[\"whoami.apex.op.sparvojo.pw\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"228c8f68aa88\"],\"X-Real-Ip\":[\"64.41.200.102\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.apex.op.sparvojo.pw\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"64.41.200.102:44228\",\"RequestURI\":\"/\",\"TLS\":null}"
time="2019-11-05T02:06:25Z" level=debug msg="vulcand/oxy/roundrobin/rr: Forwarding this request to URL" ForwardURL="http://172.19.0.3:80" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"Connection\":[\"Close\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\"],\"X-Forwarded-Host\":[\"whoami.apex.op.sparvojo.pw\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"228c8f68aa88\"],\"X-Real-Ip\":[\"64.41.200.102\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.apex.op.sparvojo.pw\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"64.41.200.102:44228\",\"RequestURI\":\"/\",\"TLS\":null}"
time="2019-11-05T02:06:25Z" level=debug msg="vulcand/oxy/roundrobin/rr: completed ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/1.1\",\"ProtoMajor\":1,\"ProtoMinor\":1,\"Header\":{\"Accept\":[\"*/*\"],\"Connection\":[\"Close\"],\"User-Agent\":[\"Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0\"],\"X-Forwarded-Host\":[\"whoami.apex.op.sparvojo.pw\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"228c8f68aa88\"],\"X-Real-Ip\":[\"64.41.200.102\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.apex.op.sparvojo.pw\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"64.41.200.102:44228\",\"RequestURI\":\"/\",\"TLS\":null}"
time="2019-11-05T02:06:25Z" level=debug msg="http: TLS handshake error from 64.41.200.102:44476: read tcp 172.19.0.2:443->64.41.200.102:44476: read: connection reset by peer"
time="2019-11-05T02:06:26Z" level=debug msg="http: TLS handshake error from 64.41.200.102:44582: read tcp 172.19.0.2:443->64.41.200.102:44582: read: connection reset by peer"
time="2019-11-05T02:06:26Z" level=debug msg="http: TLS handshake error from 64.41.200.102:44700: read tcp 172.19.0.2:443->64.41.200.102:44700: read: connection reset by peer"
You can see it said Serving default certificate for request: "sni-test.ssllabs.com"
in 2019-11-05T02:06:22Z
but prior to that, is a bunch of TLS handshake error which SSLLabs tested for vulnerabilities. I'm avoiding to do TCP dump because 1) I really don't know how to do it with docker, and 2) I have no experiences in look at TCP packets to troubleshoot something. In 2019-11-05T02:06:25Z
, it just serve the page without any problem. Here's a log where I access from my computer (I stripped my IP):
time="2019-11-05T02:01:54Z" level=debug msg="vulcand/oxy/roundrobin/rr: begin ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"en-US,en;q=0.5\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Te\":[\"trailers\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0\"],\"X-Forwarded-Host\":[\"whoami.apex.op.sparvojo.pw\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"228c8f68aa88\"],\"X-Real-Ip\":[\"hidden\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.apex.op.sparvojo.pw\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"hidden:51677\",\"RequestURI\":\"/\",\"TLS\":null}"
time="2019-11-05T02:01:54Z" level=debug msg="vulcand/oxy/roundrobin/rr: Forwarding this request to URL" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"en-US,en;q=0.5\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Te\":[\"trailers\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0\"],\"X-Forwarded-Host\":[\"whoami.apex.op.sparvojo.pw\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"228c8f68aa88\"],\"X-Real-Ip\":[\"hidden\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.apex.op.sparvojo.pw\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"hidden:51677\",\"RequestURI\":\"/\",\"TLS\":null}" ForwardURL="http://172.19.0.4:80"
time="2019-11-05T02:01:54Z" level=debug msg="vulcand/oxy/roundrobin/rr: completed ServeHttp on request" Request="{\"Method\":\"GET\",\"URL\":{\"Scheme\":\"\",\"Opaque\":\"\",\"User\":null,\"Host\":\"\",\"Path\":\"/\",\"RawPath\":\"\",\"ForceQuery\":false,\"RawQuery\":\"\",\"Fragment\":\"\"},\"Proto\":\"HTTP/2.0\",\"ProtoMajor\":2,\"ProtoMinor\":0,\"Header\":{\"Accept\":[\"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\"],\"Accept-Encoding\":[\"gzip, deflate, br\"],\"Accept-Language\":[\"en-US,en;q=0.5\"],\"Cache-Control\":[\"max-age=0\"],\"Dnt\":[\"1\"],\"Te\":[\"trailers\"],\"Upgrade-Insecure-Requests\":[\"1\"],\"User-Agent\":[\"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0\"],\"X-Forwarded-Host\":[\"whoami.apex.op.sparvojo.pw\"],\"X-Forwarded-Port\":[\"443\"],\"X-Forwarded-Proto\":[\"https\"],\"X-Forwarded-Server\":[\"228c8f68aa88\"],\"X-Real-Ip\":[\"hidden\"]},\"ContentLength\":0,\"TransferEncoding\":null,\"Host\":\"whoami.apex.op.sparvojo.pw\",\"Form\":null,\"PostForm\":null,\"MultipartForm\":null,\"Trailer\":null,\"RemoteAddr\":\"hidden:51677\",\"RequestURI\":\"/\",\"TLS\":null}"
By comparing the Request
value, I can tell there isn't much difference. With all this, the only reason I can think of, is those intentional SSL error caused by the test somehow bugged Traefik. However, I'm not sure.