This article may be useful: http://blog.exceliance.fr/2013/01/21/mitigating-the-ssl-beast-attack-using-the-aloha-load-balancer-haproxy/
On 26 February 2013 08:39, Christophe Rahier <[email protected]>wrote: > Hi, > > Actually, I configured haproxy to decrypt traffic SSL between haproxy and > http servers. Of course, it works fine ;-) > > If I test our config with https://www.ssllabs.com/ssltest, I've this > error: > > BEAST attack > > > Vulnerable INSECURE (more info > < > https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the- > beast-attack-on-tls>) > > > How would it be possible to correct this issue? > > I could correct this problem directly on the web servers with this > program: https://www.nartac.com/Products/IISCrypto/Default.aspx > > Thanks for your help. > > Regards, > > Christophe > > > >

