Bypassing Security Group Restrictions: Using Apache as a Reverse Proxy to Access Tomcat in a Test Environment
Background
During a test environment setup, we encountered a common network security constraint. Our AlmaLinux 8.10 test VM was part of a security group that only allowed TCP port 80 access from our corporate VPN IP. We needed to access a test Tomcat application running on port 8080, but we couldn’t modify the existing security group to open that port, as we lacked the necessary permissions.
Disclaimer: This solution was implemented in a non-production environment specifically for testing purposes. Always follow your organisation's security policies when working with production systems.
The Challenge
Our test environment had the following constraints:
- AlmaLinux 8.10 server running Tomcat on port 8080.
- Security group allowing only port 80 from our corporate VPN IP.
- No ability or desire to modify the security group.
- Need to access the Tomcat application from external browsers.
When attempting to access the Tomcat application directly through port 8080, we received timeout errors because the security group was blocking this traffic. Our browser attempts to access the server resulted in "This site can't be reached" and "ERR_CONNECTION_TIMED_OUT" errors, making it impossible to interact with the application.
The Solution: Apache Reverse Proxy
We decided to use Apache HTTP Server as a reverse proxy to forward requests from the allowed port 80 to Tomcat running on port 8080. Here's how we set it up:
- Install Apache HTTP Server
1sudo dnf install httpd -y
- Configure Apache as a Reverse Proxy
We created a proxy configuration file:
1sudo vim /etc/httpd/conf.d/proxy.conf
And added the following configuration:
1<VirtualHost *:80>
2 ServerName <add_your_server_public_IP_address>
3
4 # Enable proxy modules
5 ProxyRequests Off
6 ProxyPreserveHost On
7
8 # Proxy all requests to Tomcat
9 ProxyPass / http://localhost:8080/
10 ProxyPassReverse / http://localhost:8080/
11
12 ErrorLog /var/log/httpd/proxy_error.log
13 CustomLog /var/log/httpd/proxy_access.log combined
14</VirtualHost>
- Configure SELinux to Allow the Proxy
SELinux was initially blocking the proxy connections, so we needed to adjust its policy:
1sudo setsebool -P httpd_can_network_connect 1
- Start and Enable Apache
1sudo systemctl start httpd
2sudo systemctl enable httpd
Results: From Failure to Success
Before implementing this solution, any attempt to browse to the server via port 8080 (http://<your_server_public_IP>:8080)
would fail with timeout errors. The browser couldn't establish a connection due to the security group restrictions.
After setting up the Apache proxy, we were able to successfully access the Tomcat application by browsing to http:<your_server_public_IP>
(on port 80). The Apache proxy seamlessly forwarded our requests to the Test Tomcat application, and we could interact with it normally.
Why This Works
This solution effectively bypasses the security group restriction by:
- Accepting external connections on port 80 (which is allowed by the security group).
- Internally forwarding those requests to the Tomcat application on port 8080.
- Returning responses back through Apache to the client.
The key advantage is that all network traffic from external sources only uses port 80, which complies with our security group rules, while the internal communication between Apache and Tomcat happens entirely within the server using port 8080.
Additional Considerations
- SELinux: We initially had to set SELinux to permissive mode. For a more secure environment, you should create proper SELinux policies.
- Logging: Apache logs in
/var/log/httpd/
can help diagnose any issues with the proxy. - Performance: For production environments, you might want to tune Apache for better performance.
- Security: Consider implementing HTTPS if this were to be used beyond testing.
Conclusion
This approach demonstrates an effective server-side workaround for network security constraints without requiring changes to network-level security groups. By using Apache as a reverse proxy, we successfully accessed our Test Tomcat application through the allowed port 80 while maintaining compliance with the existing security group rules, transforming a previously inaccessible application into one we could use normally through our browsers. While this setup is useful for quick testing in non-production environments, it is not recommended for production use.