Hi Shawn,

See the note at the end of 
http://docs.haproxy.org/2.8/configuration.html#5.1-ocsp-update

Specifically:

> A common error that can happen with let's encrypt certificates is if the DNS
resolution provides an IPv6 address and your system does not have a valid
outgoing IPv6 route. In such a case, you can either create the appropriate
route or set the "httpclient.resolvers.prefer ipv4" option in the global
section.
Hopefully fixes your issue, as it did when I had the same issue.

Tristan

ps: I hope this message doesn't get sent as html, since I'm writing from my 
phone... apologies if it ends up doing so

> On 16 Aug 2023, at 01:37, Shawn Heisey <[email protected]> wrote:
> 
> I've got another haproxy install on which I am trying to enable automatic 
> OCSP updating.  The ones I asked about before are personal, this one is for 
> work.
> 
> When haproxy looks up the host where it can get OCSP responses, it is getting 
> an ipv6 address.
> 
> Aug 15 18:27:30 - haproxy[11234] -:- [15/Aug/2023:18:27:30.103] <OCSP-UPDATE> 
> /etc/ssl/certs/local/imat_us.wildcards.combined.pem 2 "HTTP error" 1 0
> Aug 15 18:27:30 - haproxy[11234] -:- [15/Aug/2023:18:27:30.104] <OCSP-UPDATE> 
> -/- 48/0/-1/-1/46 503 217 - - SC-- 0/0/0/0/3 0/0 
> {2600:1405:7400:13::17de:1b94} "GET 
> http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgRA%2BzJf7gt%2BI21Isq6Sy8pDxg%3D%3D
>  HTTP/1.1"
> 
> If I try the URL in the second log line with curl, I get the proper response. 
>  The curl program is getting an ipv4 address.
> 
> I thought it might be doing this because the machine did have an ipv6 local 
> link address, so I completely disabled ipv6 with the grub commandline and 
> rebooted.  Now there is no ipv6 address, but haproxy is still getting an ipv6 
> address for r3.o.lencr.org.
> 
> I couldn't locate any config for haproxy that would disable ipv6.  Is there a 
> way to fix this problem?
> 
> HAProxy version 2.8.2 2023/08/09 - https://haproxy.org/
> Status: long-term supported branch - will stop receiving fixes around Q2 2028.
> Known bugs: http://www.haproxy.org/bugs/bugs-2.8.2.html
> Running on: Linux 4.18.0-477.21.1.el8_8.x86_64 #1 SMP Thu Aug 10 13:51:50 EDT 
> 2023 x86_64
> Build options :
>  TARGET  = linux-glibc
>  CPU     = native
>  CC      = cc
>  CFLAGS  = -O2 -march=native -g -Wall -Wextra -Wundef 
> -Wdeclaration-after-statement -Wfatal-errors -Wtype-limits 
> -Wshift-negative-value -Wshift-overflow=2 -Wduplicated-cond 
> -Wnull-dereference -fwrapv -Wno-address-of-packed-member -Wno-unused-label 
> -Wno-sign-compare -Wno-unused-parameter -Wno-clobbered 
> -Wno-missing-field-initializers -Wno-cast-function-type -Wno-string-plus-int 
> -Wno-atomic-alignment
>  OPTIONS = USE_OPENSSL=1 USE_ZLIB=1 USE_SYSTEMD=1 USE_QUIC=1 USE_PCRE2_JIT=1
>  DEBUG   =
> 
> Feature list : -51DEGREES +ACCEPT4 +BACKTRACE -CLOSEFROM +CPU_AFFINITY 
> +CRYPT_H -DEVICEATLAS +DL -ENGINE +EPOLL -EVPORTS +GETADDRINFO -KQUEUE 
> -LIBATOMIC +LIBCRYPT +LINUX_SPLICE +LINUX_TPROXY -LUA -MATH -MEMORY_PROFILING 
> +NETFILTER +NS -OBSOLETE_LINKER +OPENSSL -OPENSSL_WOLFSSL -OT -PCRE +PCRE2 
> +PCRE2_JIT -PCRE_JIT +POLL +PRCTL -PROCCTL -PROMEX -PTHREAD_EMULATION +QUIC 
> +RT +SHM_OPEN -SLZ +SSL -STATIC_PCRE -STATIC_PCRE2 +SYSTEMD +TFO +THREAD 
> +THREAD_DUMP +TPROXY -WURFL +ZLIB
> 
> Default settings :
>  bufsize = 16384, maxrewrite = 1024, maxpollevents = 200
> 
> Built with multi-threading support (MAX_TGROUPS=16, MAX_THREADS=256, 
> default=4).
> Built with OpenSSL version : OpenSSL 3.1.2+quic 1 Aug 2023
> Running on OpenSSL version : OpenSSL 3.1.2+quic 1 Aug 2023
> OpenSSL library supports TLS extensions : yes
> OpenSSL library supports SNI : yes
> OpenSSL library supports : TLSv1.0 TLSv1.1 TLSv1.2 TLSv1.3
> OpenSSL providers loaded : default
> Built with network namespace support.
> Built with zlib version : 1.2.11
> Running on zlib version : 1.2.11
> Compression algorithms supported : identity("identity"), deflate("deflate"), 
> raw-deflate("deflate"), gzip("gzip")
> Built with transparent proxy support using: IP_TRANSPARENT IPV6_TRANSPARENT 
> IP_FREEBIND
> Built with PCRE2 version : 10.32 2018-09-10
> PCRE2 library supports JIT : yes
> Encrypted password support via crypt(3): yes
> Built with gcc compiler version 8.5.0 20210514 (Red Hat 8.5.0-18)
> 
> Available polling systems :
>      epoll : pref=300,  test result OK
>       poll : pref=200,  test result OK
>     select : pref=150,  test result OK
> Total: 3 (3 usable), will use epoll.
> 
> Available multiplexer protocols :
> (protocols marked as <default> cannot be specified using 'proto' keyword)
>       quic : mode=HTTP  side=FE     mux=QUIC  flags=HTX|NO_UPG|FRAMED
>         h2 : mode=HTTP  side=FE|BE  mux=H2    flags=HTX|HOL_RISK|NO_UPG
>       fcgi : mode=HTTP  side=BE     mux=FCGI  flags=HTX|HOL_RISK|NO_UPG
>  <default> : mode=HTTP  side=FE|BE  mux=H1    flags=HTX
>         h1 : mode=HTTP  side=FE|BE  mux=H1    flags=HTX|NO_UPG
>  <default> : mode=TCP   side=FE|BE  mux=PASS  flags=
>       none : mode=TCP   side=FE|BE  mux=PASS  flags=NO_UPG
> 
> Available services : none
> 
> Available filters :
>    [BWLIM] bwlim-in
>    [BWLIM] bwlim-out
>    [CACHE] cache
>    [COMP] compression
>    [FCGI] fcgi-app
>    [SPOE] spoe
>    [TRACE] trace
> 
> 

Reply via email to