[PATCH] DOC: Minor typo fix - 'question mark' -> 'exclamation mark'

2021-08-17 Thread Kunal
From: Kunal Gangakhedkar Signed-off-by: Kunal Gangakhedkar --- doc/configuration.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/configuration.txt b/doc/configuration.txt index 556e97731..0ee901c04 100644 --- a/doc/configuration.txt +++ b/doc/configuration.txt

BUILD: tools: gets the absolute path on NetBSD

2021-08-17 Thread David CARLIER
Hi, here a little patch proposal. Thanks in advance. From 30a530f3b352e907a3dd9daebfda2bb94dccbdbc Mon Sep 17 00:00:00 2001 From: David Carlier Date: Tue, 17 Aug 2021 08:44:25 +0100 Subject: [PATCH] BUILD: tools: get the absolute path of the current binary on NetBSD. NetBSD stores the

Re: BUILD: tools: gets the absolute path on NetBSD

2021-08-17 Thread Willy Tarreau
Hi David, On Tue, Aug 17, 2021 at 08:49:29AM +0100, David CARLIER wrote: > Hi, > > here a little patch proposal. Applied, thank you! Willy

Re: [PR] DOC/MINOR: fix typo in management document

2021-08-17 Thread Willy Tarreau
On Wed, Aug 04, 2021 at 09:17:21AM +0200, PR Bot wrote: > Dear list! > > Author: Jonathon Lacher <6679714+jonathonlac...@users.noreply.github.com> > Number of patches: 1 > > This is an automated relay of the Github pull request: >DOC/MINOR: fix typo in management document > > Patch

Re: [External] Re: [PATCH] JA3 TLS Fingerprinting (take 2)

2021-08-17 Thread Willy Tarreau
Hi Marcin, On Mon, Aug 16, 2021 at 01:55:02PM +0200, Marcin Deranek wrote: > Hi, > > Do you have any update on merging this? Sorry, I think we've missed it :-( Worse, I was wondering if you managed to make any progress on it :-/ I'm currently working on preparing a set of stable branches,

Re: [PATCH] DOC: Minor typo fix - 'question mark' -> 'exclamation mark'

2021-08-17 Thread Willy Tarreau
looks good, now applied, thank you! Willy

Re: Clarification about http-reuse

2021-08-17 Thread Willy Tarreau
Hi Alex, On Tue, Aug 17, 2021 at 02:19:38PM +0200, Aleksandar Lazic wrote: > ``` > 3424 if ((curproxy->mode != PR_MODE_HTTP) && > (curproxy->options & PR_O_REUSE_MASK) != PR_O_REUSE_NEVR) > 3425 curproxy->options &= ~PR_O_REUSE_MASK; > ```

[ANNOUNCE] haproxy-2.5-dev4

2021-08-17 Thread Willy Tarreau
Hi, HAProxy 2.5-dev4 was released on 2021/08/17. It added 82 new commits after version 2.5-dev3. This version was expected to be emitted last week but was slightly delayed so that it contains the final fixes for the H2 vulnerabilities reported by Tim that were described in previous message, and

[ANNOUNCE] HTTP/2 vulnerabilities from 2.0 to 2.5-dev

2021-08-17 Thread Willy Tarreau
Hi everyone, HAProxy is affected by 4 vulnerabilities in its HTTP/2 implementation in recent versions (starting with 2.0). Three of them are considered as having a moderate impact as they only affect the interpretation of the authority (Host header field) in H2->H2 communications in versions 2.2

[ANNOUNCE] haproxy-2.0.24

2021-08-17 Thread Willy Tarreau
Hi, HAProxy 2.0.24 was released on 2021/08/17. It added 18 new commits after version 2.0.23. This version contains the fixes for the H2 vulnerabilities reported by Tim that were described in previous message, and which allows to abuse the H2 ":method" pseudo-header to forge some malformed HTTP/1

BUILD: tools: get the absolute path on FreeBSD

2021-08-17 Thread David CARLIER
Hi, same as earlier but for FreeBSD this time. Thanks. From 07be546638949864ef678b0e39871b7febceeaed Mon Sep 17 00:00:00 2001 From: DC Date: Tue, 17 Aug 2021 12:55:49 +0100 Subject: [PATCH] BUILD: tools: get the absolute path of the current binary on FreeBSD. FreeBSD stores the absolute path

Clarification about http-reuse

2021-08-17 Thread Aleksandar Lazic
Hi. In the doc is this part http://cbonte.github.io/haproxy-dconv/2.4/configuration.html#4-http-reuse ``` By default, a connection established between HAProxy and the backend server which is considered safe for reuse is moved back to the server's idle connections pool so that any other request

[ANNOUNCE] haproxy-2.2.16

2021-08-17 Thread Willy Tarreau
Hi, HAProxy 2.2.16 was released on 2021/08/17. It added 29 new commits after version 2.2.15. This version contains the fixes for the H2 vulnerabilities reported by Tim that were described in previous message, and which affect Host name consistency with H2 backend servers when Host and :authority

[ANNOUNCE] haproxy-2.4.3

2021-08-17 Thread Willy Tarreau
Hi, HAProxy 2.4.3 was released on 2021/08/17. It added 46 new commits after version 2.4.2. This version contains the fixes for the H2 vulnerabilities reported by Tim that were described in previous message, and which affect Host name consistency with H2 backend servers when Host and :authority

[ANNOUNCE] haproxy-2.3.13

2021-08-17 Thread Willy Tarreau
Hi, HAProxy 2.3.13 was released on 2021/08/17. It added 31 new commits after version 2.3.12. This version contains the fixes for the H2 vulnerabilities reported by Tim that were described in previous message, and which affect Host name consistency with H2 backend servers when Host and :authority

Re: [ANNOUNCE] HTTP/2 vulnerabilities from 2.0 to 2.5-dev

2021-08-17 Thread Tim Düsterhus
Vincent, On 8/17/21 5:49 PM, Vincent Bernat wrote: For users of haproxy.debian.net or Launchpad PPA, the vulnerabilities are fixed by patching the previous versions. Launchpad PPA builders are still running but it should be available in the next hour. I will upload the new versions later this

Re: [ANNOUNCE] HTTP/2 vulnerabilities from 2.0 to 2.5-dev

2021-08-17 Thread Willy Tarreau
On Tue, Aug 17, 2021 at 06:57:28PM +0200, Tim Düsterhus wrote: > Hi Willy, Everyone, > > On 8/17/21 5:13 PM, Willy Tarreau wrote: > > 2) Domain parts in ":scheme" and ":path" > > > > [...] As such HTTP/1 servers are safe and only HTTP/2 servers are exposed. > > I'd like to clarify that the

Re: [ANNOUNCE] HTTP/2 vulnerabilities from 2.0 to 2.5-dev

2021-08-17 Thread Tim Düsterhus
Hi Willy, Everyone, On 8/17/21 5:13 PM, Willy Tarreau wrote: 2) Domain parts in ":scheme" and ":path" [...] As such HTTP/1 servers are safe and only HTTP/2 servers are exposed. I'd like to clarify that the above statement is not true. The issue also affects H2->HAProxy->H1 connections. It

Re: [ANNOUNCE] HTTP/2 vulnerabilities from 2.0 to 2.5-dev

2021-08-17 Thread Vincent Bernat
❦ 17 August 2021 17:13 +02, Willy Tarreau: > HAProxy is affected by 4 vulnerabilities in its HTTP/2 implementation in > recent versions (starting with 2.0). Three of them are considered as having > a moderate impact as they only affect the interpretation of the authority > (Host header field) in

Re: [ANNOUNCE] HTTP/2 vulnerabilities from 2.0 to 2.5-dev

2021-08-17 Thread Willy Tarreau
On Tue, Aug 17, 2021 at 05:56:15PM +0200, Tim Düsterhus wrote: > Vincent, > > On 8/17/21 5:49 PM, Vincent Bernat wrote: > > For users of haproxy.debian.net or Launchpad PPA, the vulnerabilities > > are fixed by patching the previous versions. Launchpad PPA builders are > > still running but it