There has been a POST bug (among many others) which was fixed in -dev16. Please upgrade to latest 1.5-dev17.
---------------------------------------- > Date: Thu, 10 Jan 2013 17:44:07 -0800 > From: [email protected] > To: [email protected] > Subject: Problems with sni and big connections. > > Context: SSL stuff, haproxy HA-Proxy version 1.5-dev15 2012/12/12 ; > complete haproxy info at the bottom. > > Our app does large file uploads via an ancillary java applet thingy; > these look like so: > > 00000009:https.accept(0006)=000f from [64.236.139.254:35763] > 00000009:https.clireq[000f:ffff]: POST /cytobank/uploadServlet HTTP/1.1 > 00000009:https.clihdr[000f:ffff]: User-Agent: Cytobank Upload > 00000009:https.clihdr[000f:ffff]: Content-Type: multipart/form-data; > boundary=756zrpPEjQyIs1KS9cHjGzvox7mMfeCZR0 > 00000009:https.clihdr[000f:ffff]: Cache-Control: no-cache > 00000009:https.clihdr[000f:ffff]: Pragma: no-cache > 00000009:https.clihdr[000f:ffff]: Host: dvs-staging.cytobank.org > 00000009:https.clihdr[000f:ffff]: Accept: text/html, image/gif, image/jpeg, > *; q=.2, */*; q=.2 > 00000009:https.clihdr[000f:ffff]: Connection: keep-alive > 00000009:https.clihdr[000f:ffff]: Content-Length: 6451523 > 00000009:https.clihdr[000f:ffff]: Cookie: > __utma=51498683.1371821700.1307729573.1357763653.1357770695.223; > __utmz=51498683.1348737696.200.4.utmcsr=localhost|utmccn=(referral)|utmcmd=referral|utmcct=/cytobank/subscriptions/subscribe; > __utma=20047853.812597310.1357601503.1357799042.1357864337.4; > __utmz=20047853.1357601503.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); > __utmb=20047853.32.10.1357864337; __utmc=20047853; openid_provider=Google; > user_credentials=ff9ed09a5a08f5103cdce0bcf9c7eda9d9bcee3e2e5a392b0e0b066780f5cfdb2a505a8bdd17d505057b751b20a96989ed61f6435a057d751958f034c095be50%3A%3A2 > 00000009:dvs-staging.cytobank.org-https-tomcat.srvrep[000f:0010]: HTTP/1.1 > 200 OK > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: Server: > Apache-Coyote/1.1 > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: > Content-Type: text/html;charset=ISO-8859-1 > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: > Transfer-Encoding: chunked > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: Date: Fri, > 11 Jan 2013 01:13:19 GMT > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: Connection: > close > 00000009:https.clicls[000f:ffff] > 00000009:https.closed[000f:ffff] > > I'm using haproxy's ssl, like so: > > bind 0.0.0.0:443 ssl crt /opt/haproxy/etc/wildcard.cert > > If the config for this backend is like this: > > use_backend dvs-staging.cytobank.org-https-tomcat if { path_reg -i > ^/cytobank/ } > > everything works fine, but if it's like this: > > use_backend dvs-staging.cytobank.org-https-tomcat if { ssl_fc_sni -i > dvs-staging.cytobank.org } { path_reg -i ^/cytobank/ } > > The upload goes very slowly and then fails. > > There is no obvious difference between the outputs in these cases; > the above was successful, this is a failed one: > > 00000009:https.accept(0006)=000f from [64.236.139.254:45900] > 00000009:https.clireq[000f:ffff]: POST /cytobank/uploadServlet HTTP/1.1 > 00000009:https.clihdr[000f:ffff]: User-Agent: Cytobank Upload > 00000009:https.clihdr[000f:ffff]: Content-Type: multipart/form-data; > boundary=qKulbQFAOI0yUOyRv5tJ8Itzvy4aMPqP58 > 00000009:https.clihdr[000f:ffff]: Cache-Control: no-cache > 00000009:https.clihdr[000f:ffff]: Pragma: no-cache > 00000009:https.clihdr[000f:ffff]: Host: dvs-staging.cytobank.org > 00000009:https.clihdr[000f:ffff]: Accept: text/html, image/gif, image/jpeg, > *; q=.2, */*; q=.2 > 00000009:https.clihdr[000f:ffff]: Connection: keep-alive > 00000009:https.clihdr[000f:ffff]: Content-Length: 6451523 > 00000009:https.clihdr[000f:ffff]: Cookie: > __utma=51498683.1371821700.1307729573.1357763653.1357770695.223; > __utmz=51498683.1348737696.200.4.utmcsr=localhost|utmccn=(referral)|utmcmd=referral|utmcct=/cytobank/subscriptions/subscribe; > __utma=20047853.812597310.1357601503.1357799042.1357864337.4; > __utmz=20047853.1357601503.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); > __utmb=20047853.28.10.1357864337; __utmc=20047853; openid_provider=Google; > user_credentials=ff9ed09a5a08f5103cdce0bcf9c7eda9d9bcee3e2e5a392b0e0b066780f5cfdb2a505a8bdd17d505057b751b20a96989ed61f6435a057d751958f034c095be50%3A%3A2 > 00000007:http.clicls[000e:ffff] > 00000007:http.closed[000e:ffff] > 00000005:https.clicls[000a:ffff] > 00000005:https.closed[000a:ffff] > 00000002:https.clicls[0009:ffff] > 00000002:https.closed[0009:ffff] > 00000004:https.clicls[000c:ffff] > 00000004:https.closed[000c:ffff] > 00000003:https.clicls[000b:ffff] > 00000003:https.closed[000b:ffff] > 00000001:https.clicls[0008:ffff] > 00000001:https.closed[0008:ffff] > 00000006:https.clicls[000d:ffff] > 00000006:https.closed[000d:ffff] > 00000009:dvs-staging.cytobank.org-https-tomcat.srvrep[000f:0010]: HTTP/1.1 > 200 OK > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: Server: > Apache-Coyote/1.1 > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: > Content-Type: text/html;charset=ISO-8859-1 > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: > Transfer-Encoding: chunked > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: Date: Fri, > 11 Jan 2013 01:08:39 GMT > 00000009:dvs-staging.cytobank.org-https-tomcat.srvhdr[000f:0010]: Connection: > close > 00000009:dvs-staging.cytobank.org-https-tomcat.srvcls[000f:0010] > 00000009:dvs-staging.cytobank.org-https-tomcat.clicls[000f:0010] > 00000009:dvs-staging.cytobank.org-https-tomcat.closed[000f:0010] > > (all the extra closes are because it took so long, AFAICT). > > I'm pretty sure this is an haproxy bug. My *guess* is that what's > happening is that the first chunk is sni-ing properly, but that > everything else on the same keep-alive session is failing the sni > check, and effectively getting thrown away. > > If it's PEBKAC, I'd love some assistance. > > Thanks! > > -Robin > > [rlpowell@ds1007 ~]$ sudo /opt/haproxy/usr/local/sbin/haproxy -vv > HA-Proxy version 1.5-dev15 2012/12/12 > Copyright 2000-2012 Willy Tarreau <[email protected]> > > Build options : > TARGET = linux26 > CPU = generic > CC = gcc > CFLAGS = -O2 -g -fno-strict-aliasing > OPTIONS = USE_OPENSSL=1 USE_PCRE=1 > > Default settings : > maxconn = 2000, bufsize = 16384, maxrewrite = 8192, maxpollevents = 200 > > Encrypted password support via crypt(3): yes > Built without zlib support (USE_ZLIB not set) > Compression algorithms supported : identity > Built with OpenSSL version : OpenSSL 1.0.1c 10 May 2012 > OpenSSL library supports TLS extensions : yes > OpenSSL library supports SNI : yes > OpenSSL library supports prefer-server-ciphers : yes > > Available polling systems : > epoll : pref=300, test result OK > poll : pref=200, test result OK > select : pref=150, test result OK > Total: 3 (3 usable), will use epoll. > >

