Web proxy with OpenBSD and relayd
March 24, 2025
But why?
Recently I needed to setup a proxy for three websites. The proxy and the sites are distributed among two servers. One of the servers hosts the proxy itself as well as two of the sites. The other server hosts the remaining site. The two machines are connected through the internet so the forwarded traffic to the remote server needs to be encrypted. A picture is worth a thousand words as they say:

Both servers are running OpenBSD, so we're going to rely on relayd(8)
as the proxy and httpd(8)
as the web server.
relayd setup
In the relayd(8)
configuration file /etc/relayd.conf
we must first define two tables, one for the local server running relayd(8)
and another for the remote server server2.com
:
table <local> { 127.0.0.1 }
table <remote> { server2.com }
Then we have to define a www
protocol to setup the proxy behavior for regular HTTP connections. It will forward the request to the right server based on the Host
header. We also add special headers to the forwarded request so that the services running behind the proxy can use the information provided with these headers to adjust their behavior, should they need to. Finally, a request that doesn't match any of the expected hostnames is simply blocked.
http protocol www {
match request header append "X-Forwarded-For" value "$REMOTE_ADDR"
match request header append "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT"
pass request quick header "Host" value "site3.com" forward to <remote>
pass request quick forward to <local>
block
}
We also define a wwwtls
protocol that is configured almost the same, it just has the certificates for each host we are proxying.
http protocol wwwtls {
tls keypair site1.com
tls keypair site2.com
tls keypair site3.com
match request header append "X-Forwarded-For" value "$REMOTE_ADDR"
match request header append "X-Forwarded-By" value "$SERVER_ADDR:$SERVER_PORT"
pass request quick header "Host" value "site3.com" forward to <remote>
pass request quick forward to <local>
block
}
The line tls keypair site1.com
means that relayd(8)
will look for a certificate file named /etc/ssl/site1.com.crt
and a private key named /etc/ssl/private/site1.com.key
. If your certificates are signed through a chain (like the ones provided by Let's Encrypt), the .crt
file needs to contain the intermediate certificates, not just your final one. I use acme-client(1)
to manage my certificates, which does not write the intermediate certificates with the default configuration. Thus we need to set this up in /etc/acme-client.conf
:
domain site1.com {
domain key "/etc/ssl/private/site1.com.key"
domain full chain certificate "/etc/ssl/site1.com.crt"
sign with letsencrypt
}
After editing the file, you should of course run acme-client
to update the certificates. Next come the relays. They define which protocol to use for a request as well as where it can be forwarded. There's one for http
and another for https
. Nothing special here except that you may have noticed the ports for the local web server are set to 8080 and 4443. That's because relayd(8)
is already listening on ports 80 and 443 on the proxy.
relay www {
listen on egress port 80
protocol www
forward to <local> port 8080
forward to <remote> port 80
}
relay wwwtls {
listen on egress port 443 tls
protocol wwwtls
forward with tls to <local> port 4443
forward with tls to <remote> port 443
}
Ideally, we would not need to use TLS for the local forwarding. But somehow relayd(8)
would not work with TLS enabled only on the remote forward rule. I don't know whether it's a configuration mistake on my end or whether it's a relayd(8)
quirk. If you know more about this, I'd be glad to hear about it.
Finally, at the very top of the file, we can ask relayd(8)
to log all connections.
log connection
httpd setup
There's not much to do on the httpd(8)
side of things, except setting the ports to 8080 and 4443 on the local server, and also setting the log style to forwarded
. This allows the IP address of the client which made the request to be logged instead of just the proxy. Please note that this information is read from the X-Forwarded-For
and X-Forwarded-Port
request headers, so the proxy has to set those on the forwarded request. We set this up in the previous section. An example site could be configured as such in /etc/httpd.conf
:
server "site1.com" {
listen on * port 8080
listen on * port 4443
log style forwarded
tls {
certificate "/etc/ssl/site1.com.crt"
key "/etc/ssl/private/site1.com.key"
}
root "/htdocs/site1"
}
If any of the services you're proxying requires its configuration to be updated, please make sure to do so.
Why not a VPN to secure traffic over the internet?
I don't know how to setup a VPN. It could be the topic of a future article, but I don't know that it would provide many benefits? If you can think of any, please get in touch!