Le lundi 10 septembre 2012 15:52:23 Willy Tarreau a écrit :
> Hi Guillaume,
> 
> On Mon, Sep 10, 2012 at 03:46:26PM +0200, Guillaume Castagnino wrote:
> > Nice !
> > 
> > Just set up on my personnal server with 2 wildcard certificates. It
> > seems to work like a charm :)
> > 
> > I use this, TLSv1.2 enabled (so using openssl 1.0.1):
> >     bind :::443 ssl crt /etc/ssl/startssl/haproxy/xwing.info.pem crt
> > 
> > /etc/ssl/startssl/haproxy/ ciphers
> > ECDHE-RSA-AES128-SHA256:AES128-GCM-
> > SHA256:RC4:HIGH:!MD5:!aNULL:!EDH prefer-server-ciphers
> 
> Nice, thank you for the feedback !

Just one precision on the cert.pem content, to achieve the best 
compliance: it seems that haproxy is fine when feeding the full 
certificate chain in the .pem file instead of only the the 
certificate/private key pair (as suggest on the first SSL announce from 
last week). This make clients that do certificate chain verification 
happy:

So cert.pem contains:
- Server certificate
- Intermediate CA 1 certificate
- Intermediate CA 2 certificate
...
- Intermediate CA n certificate
- Root CA certificate
- Private key

Of course, the number of intermediate CA may change depending on the 
certificate chain of the SSL provider (usually, there is just one 
intermediate CA).


And this is just working flawlessly, making SSL nazis happy ;).

Thanks !

-- 
Guillaume Castagnino
    [email protected] / [email protected]


Reply via email to