Hi David,

On Tue, Sep 04, 2012 at 03:15:13PM +0200, David BERARD wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi,
> 
> On 04/Sep - 01:37, Willy Tarreau <[email protected]> wrote:
> >| Have a lot of fun and please report your success/failures,
> >| Willy
> 
> Thanks a lot for this useful feature. It works well on a dual PPC64 Linux 
> server.

Excellent, thanks for the report.

> I wrote a small path to add the SSL_OP_CIPHER_SERVER_PREFERENCE OpenSSL option
> to frontend, if the 'prefer-server-ciphers' keyword is set.
> 
>       
> https://0x1.fr/files/patchs/haproxy-ss-20120904_prefer_server_ciphers.patch
> 
> Example :
> 
>       bind 10.11.12.13 ssl /etc/haproxy/ssl/cert.pem ciphers 
> RC4:HIGH:!aNULL:!MD5 prefer-server-ciphers
> 
> This option mitigate the effect of the BEAST Attack (as I understand), and it
> equivalent to : 
>       - Apache HTTPd SSLHonorCipherOrder option.
>       - Nginx ssl_prefer_server_ciphers option.

OK I did not know there was such a workaround. Thanks for the patch, I'm
going to apply it now.

> Maybe it can be useful to add OpenSSL option directly in the haproxy
> configuration as the 'options' keyword in stunnel.

No, your current solution is better, as we'd like to get such options for
each "bind" line. So your patch is perfect :-)

Best regards,
Willy


Reply via email to