2019-09-17 13:55:29 +02:00
# Using a reverse proxy with Synapse
It is recommended to put a reverse proxy such as
[nginx ](https://nginx.org/en/docs/http/ngx_http_proxy_module.html ),
[Apache ](https://httpd.apache.org/docs/current/mod/mod_proxy_http.html ),
2021-03-06 12:49:19 +01:00
[Caddy ](https://caddyserver.com/docs/quick-starts/reverse-proxy ),
[HAProxy ](https://www.haproxy.org/ ) or
[relayd ](https://man.openbsd.org/relayd.8 ) in front of Synapse. One advantage
2019-09-17 13:55:29 +02:00
of doing so is that it means that you can expose the default https port
(443) to Matrix clients without needing to run Synapse with root
privileges.
2021-02-24 19:11:33 +01:00
You should configure your reverse proxy to forward requests to `/_matrix` or
`/_synapse/client` to Synapse, and have it set the `X-Forwarded-For` and
`X-Forwarded-Proto` request headers.
You should remember that Matrix clients and other Matrix servers do not
necessarily need to connect to your server via the same server name or
port. Indeed, clients will use port 443 by default, whereas servers default to
port 8448. Where these are different, we refer to the 'client port' and the
'federation port'. See [the Matrix
2020-02-18 14:53:46 +01:00
specification](https://matrix.org/docs/spec/server_server/latest#resolving-server-names)
for more details of the algorithm used for federation connections, and
2021-07-15 13:47:55 +02:00
[Delegation ](delegate.md ) for instructions on setting up delegation.
2019-09-17 13:55:29 +02:00
2021-02-24 19:11:33 +01:00
**NOTE**: Your reverse proxy must not `canonicalise` or `normalise`
the requested URI in any way (for example, by decoding `%xx` escapes).
Beware that Apache *will* canonicalise URIs unless you specify
`nocanon` .
2020-09-10 14:26:34 +02:00
2019-09-17 13:55:29 +02:00
Let's assume that we expect clients to connect to our server at
`https://matrix.example.com` , and other servers to connect at
`https://example.com:8448` . The following sections detail the configuration of
the reverse proxy and the homeserver.
2021-08-09 17:12:53 +02:00
## Homeserver Configuration
The HTTP configuration will need to be updated for Synapse to correctly record
client IP addresses and generate redirect URLs while behind a reverse proxy.
In `homeserver.yaml` set `x_forwarded: true` in the port 8008 section and
consider setting `bind_addresses: ['127.0.0.1']` so that the server only
listens to traffic on localhost. (Do not change `bind_addresses` to `127.0.0.1`
when using a containerized Synapse, as that will prevent it from responding
to proxied traffic.)
2020-05-05 12:29:29 +02:00
## Reverse-proxy configuration examples
2019-09-17 13:55:29 +02:00
2020-05-05 12:29:29 +02:00
**NOTE**: You only need one of these.
2019-09-17 13:55:29 +02:00
### nginx
2021-11-01 12:35:55 +01:00
```nginx
2020-05-15 16:13:39 +02:00
server {
2021-02-18 14:46:16 +01:00
listen 443 ssl http2;
listen [::]:443 ssl http2;
2020-07-16 17:01:45 +02:00
# For the federation port
2021-02-18 14:46:16 +01:00
listen 8448 ssl http2 default_server;
listen [::]:8448 ssl http2 default_server;
2020-07-16 17:01:45 +02:00
2020-05-15 16:13:39 +02:00
server_name matrix.example.com;
2022-01-04 23:31:45 +01:00
location ~ ^(/_matrix|/_synapse/client) {
2021-08-27 13:54:21 +02:00
# note: do not add a path (even a single /) after the port in `proxy_pass` ,
# otherwise nginx will canonicalise the URI and cause signature verification
# errors.
2020-05-15 16:13:39 +02:00
proxy_pass http://localhost:8008;
proxy_set_header X-Forwarded-For $remote_addr;
2021-02-24 19:11:33 +01:00
proxy_set_header X-Forwarded-Proto $scheme;
2021-03-03 12:08:11 +01:00
proxy_set_header Host $host;
2020-05-15 16:13:39 +02:00
# Nginx by default only allows file uploads up to 1M in size
# Increase client_max_body_size to match max_upload_size defined in homeserver.yaml
2020-10-09 17:58:23 +02:00
client_max_body_size 50M;
2020-05-15 16:13:39 +02:00
}
}
```
2021-08-27 13:54:21 +02:00
### Caddy v1
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
```
matrix.example.com {
proxy /_matrix http://localhost:8008 {
transparent
}
2020-09-10 14:26:34 +02:00
proxy /_synapse/client http://localhost:8008 {
transparent
}
2020-05-15 16:13:39 +02:00
}
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
example.com:8448 {
proxy / http://localhost:8008 {
transparent
}
}
```
2019-09-17 13:55:29 +02:00
2021-08-27 13:54:21 +02:00
### Caddy v2
2020-05-15 15:36:01 +02:00
2020-05-15 16:13:39 +02:00
```
matrix.example.com {
reverse_proxy /_matrix/* http://localhost:8008
2020-09-10 14:26:34 +02:00
reverse_proxy /_synapse/client/* http://localhost:8008
2020-05-15 16:13:39 +02:00
}
2020-05-15 15:36:01 +02:00
2020-05-15 16:13:39 +02:00
example.com:8448 {
reverse_proxy http://localhost:8008
}
```
2021-07-14 18:50:30 +02:00
[Delegation ](delegate.md ) example:
```
(matrix-well-known-header) {
# Headers
header Access-Control-Allow-Origin "*"
header Access-Control-Allow-Methods "GET, POST, PUT, DELETE, OPTIONS"
header Access-Control-Allow-Headers "Origin, X-Requested-With, Content-Type, Accept, Authorization"
header Content-Type "application/json"
}
example.com {
handle /.well-known/matrix/server {
import matrix-well-known-header
respond `{"m.server":"matrix.example.com:443"}`
}
handle /.well-known/matrix/client {
import matrix-well-known-header
respond `{"m.homeserver":{"base_url":"https://matrix.example.com"},"m.identity_server":{"base_url":"https://identity.example.com"}}`
}
}
matrix.example.com {
reverse_proxy /_matrix/* http://localhost:8008
reverse_proxy /_synapse/client/* http://localhost:8008
}
```
2020-05-15 15:36:01 +02:00
2019-09-17 13:55:29 +02:00
### Apache
2021-11-01 12:35:55 +01:00
```apache
2020-05-15 16:13:39 +02:00
< VirtualHost * :443 >
SSLEngine on
2021-03-26 11:38:31 +01:00
ServerName matrix.example.com
2019-09-17 13:55:29 +02:00
2021-02-24 19:11:33 +01:00
RequestHeader set "X-Forwarded-Proto" expr=%{REQUEST_SCHEME}
2020-05-15 16:13:39 +02:00
AllowEncodedSlashes NoDecode
2021-03-26 11:38:31 +01:00
ProxyPreserveHost on
2020-05-15 16:13:39 +02:00
ProxyPass /_matrix http://127.0.0.1:8008/_matrix nocanon
ProxyPassReverse /_matrix http://127.0.0.1:8008/_matrix
2020-09-10 14:26:34 +02:00
ProxyPass /_synapse/client http://127.0.0.1:8008/_synapse/client nocanon
ProxyPassReverse /_synapse/client http://127.0.0.1:8008/_synapse/client
2020-05-15 16:13:39 +02:00
< / VirtualHost >
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
< VirtualHost * :8448 >
SSLEngine on
2021-03-26 11:38:31 +01:00
ServerName example.com
2019-09-17 13:55:29 +02:00
2021-02-24 19:11:33 +01:00
RequestHeader set "X-Forwarded-Proto" expr=%{REQUEST_SCHEME}
2020-05-15 16:13:39 +02:00
AllowEncodedSlashes NoDecode
ProxyPass /_matrix http://127.0.0.1:8008/_matrix nocanon
ProxyPassReverse /_matrix http://127.0.0.1:8008/_matrix
< / VirtualHost >
```
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
**NOTE**: ensure the `nocanon` options are included.
2019-09-17 13:55:29 +02:00
2020-09-23 12:14:08 +02:00
**NOTE 2**: It appears that Synapse is currently incompatible with the ModSecurity module for Apache (`mod_security2`). If you need it enabled for other services on your web server, you can disable it for Synapse's two VirtualHosts by including the following lines before each of the two `</VirtualHost>` above:
2021-11-01 12:35:55 +01:00
```apache
2020-09-23 12:14:08 +02:00
< IfModule security2_module >
SecRuleEngine off
< / IfModule >
```
2021-03-26 11:38:31 +01:00
**NOTE 3**: Missing `ProxyPreserveHost on` can lead to a redirect loop.
2019-09-17 13:55:29 +02:00
### HAProxy
2020-05-15 16:13:39 +02:00
```
frontend https
2022-03-28 12:48:18 +02:00
bind *:443,[::]:443 ssl crt /etc/ssl/haproxy/ strict-sni alpn h2,http/1.1
2021-02-24 19:11:33 +01:00
http-request set-header X-Forwarded-Proto https if { ssl_fc }
http-request set-header X-Forwarded-Proto http if !{ ssl_fc }
http-request set-header X-Forwarded-For %[src]
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
# Matrix client traffic
2021-11-01 15:16:02 +01:00
acl matrix-host hdr(host) -i matrix.example.com matrix.example.com:443
2020-05-15 16:13:39 +02:00
acl matrix-path path_beg /_matrix
2020-09-10 14:26:34 +02:00
acl matrix-path path_beg /_synapse/client
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
use_backend matrix if matrix-host matrix-path
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
frontend matrix-federation
2022-03-28 12:48:18 +02:00
bind *:8448,[::]:8448 ssl crt /etc/ssl/haproxy/synapse.pem alpn h2,http/1.1
2021-02-24 19:11:33 +01:00
http-request set-header X-Forwarded-Proto https if { ssl_fc }
http-request set-header X-Forwarded-Proto http if !{ ssl_fc }
http-request set-header X-Forwarded-For %[src]
2020-05-15 16:13:39 +02:00
default_backend matrix
2019-09-17 13:55:29 +02:00
2020-05-15 16:13:39 +02:00
backend matrix
server matrix 127.0.0.1:8008
```
2019-09-17 13:55:29 +02:00
2021-03-06 12:49:19 +01:00
### Relayd
```
table < webserver > { 127.0.0.1 }
table < matrixserver > { 127.0.0.1 }
http protocol "https" {
tls { no tlsv1.0, ciphers "HIGH" }
tls keypair "example.com"
match header set "X-Forwarded-For" value "$REMOTE_ADDR"
match header set "X-Forwarded-Proto" value "https"
# set CORS header for .well-known/matrix/server, .well-known/matrix/client
# httpd does not support setting headers, so do it here
match request path "/.well-known/matrix/*" tag "matrix-cors"
match response tagged "matrix-cors" header set "Access-Control-Allow-Origin" value "*"
pass quick path "/_matrix/*" forward to < matrixserver >
pass quick path "/_synapse/client/*" forward to < matrixserver >
# pass on non-matrix traffic to webserver
pass forward to < webserver >
}
relay "https_traffic" {
listen on egress port 443 tls
protocol "https"
forward to < matrixserver > port 8008 check tcp
forward to < webserver > port 8080 check tcp
}
http protocol "matrix" {
tls { no tlsv1.0, ciphers "HIGH" }
tls keypair "example.com"
block
pass quick path "/_matrix/*" forward to < matrixserver >
pass quick path "/_synapse/client/*" forward to < matrixserver >
}
relay "matrix_federation" {
listen on egress port 8448 tls
protocol "matrix"
forward to < matrixserver > port 8008 check tcp
}
```
2020-08-07 15:21:24 +02:00
## Health check endpoint
Synapse exposes a health check endpoint for use by reverse proxies.
Each configured HTTP listener has a `/health` endpoint which always returns
200 OK (and doesn't get logged).
2020-09-10 14:26:34 +02:00
## Synapse administration endpoints
Endpoints for administering your Synapse instance are placed under
`/_synapse/admin` . These require authentication through an access token of an
admin user. However as access to these endpoints grants the caller a lot of power,
we do not recommend exposing them to the public internet without good reason.