Source: haproxy
Version: 1.6.9-2
Severity: normal

The default haproxy.cfg include tls cipher and protocol restrictions.
They cite an external source:

This has now been updated, so the shipping cfg file should probably be
updated too?

That having been said, it might be better to instead (or as well) point
the reader at:

... which gives more extensive and general configuration related to SSL
security, as well as more options and explicit client compatability.

You could also link the specific haproxy+openssl URL e.g. for sid at the

... along with a recommendation to maintain security with respect to
this URL?



-- System Information:
Debian Release: stretch/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.7.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to