1. The problem I’m having:
I’m using Caddy behind a load balancer that strips HTTPS from incoming requests before it passes it to the server. (This infrastructure is managed by my uni’s IT team and cannot be changed).
I tried specified a listening address using http://caddy-test.uqcloud.net:443
but this did not work. Listening only on port 80 does, but it prevents browsers that upgrade to HTTPS automatically (like Fx with HTTPS-everywhere enabled) from being able to connect.
Caddy is run as the last step in a script that generates files and then uses the file_server to allow the user to download the artifacts.
2. Error messages and/or full log output:
2025/03/28 01:42:05.646 INFO using adjacent Caddyfile
Error: adapting config using caddyfile: server block 0, key 1 (http://caddy-test.uqcloud.net:443): determining listener address: [http://caddy-test.uqcloud.net:443] scheme and port violate convention
3. Caddy version:
# caddy version
v2.9.1 h1:OEYiZ7DbCzAWVb6TNEkjRcSCRGHVoZsJinoDR/n9oaY=
4. How I installed and ran Caddy:
I installed Caddy by following the instructions for Debian, Ubuntu, Raspbian on Install — Caddy Documentation. I picked the stable release channel.
a. System environment:
Debian 12, x86-64, running from CLI.
b. Command:
$ caddy run
c. Service/unit/compose file:
N/A
d. My complete Caddy config:
{
servers {
protocols h1 h2
trusted_proxies static 172.23.83.250/31
}
auto_https off
}
http://caddy-test.uqcloud.net:80, http://caddy-test.uqcloud.net:443 {
file_server browse
}
5. Links to relevant resources:
The documentation for the containers on which it is running specify that it is necessary to listen for regular HTTP on both port 80 and 443, and provide instructions for Apache2.
First, when the EAIT loadbalancers direct HTTP requests to your zone, they make a number of changes to the request. They inject some additional headers (e.g. X-Real-IP so you can see the actual client IP address), and they also strip TLS/SSL from HTTPS requests, relaying them as plain HTTP.
This means that your zone has to be configured to listen for plain HTTP requests without TLS/SSL on both ports 80 and 443. You should also configure your web server to trust and process the headers such as X-Real-IP where possible, to keep your logs accurate.