This article may be useful:
http://blog.exceliance.fr/2013/01/21/mitigating-the-ssl-beast-attack-using-the-aloha-load-balancer-haproxy/


On 26 February 2013 08:39, Christophe Rahier <[email protected]>wrote:

> Hi,
>
> Actually, I configured haproxy to decrypt traffic SSL between haproxy and
> http servers. Of course, it works fine ;-)
>
> If I test our config with https://www.ssllabs.com/ssltest, I've this
> error:
>
> BEAST attack
>
>
>                                 Vulnerable   INSECURE (more info
> <
> https://community.qualys.com/blogs/securitylabs/2011/10/17/mitigating-the-
> beast-attack-on-tls>)
>
>
> How would it be possible to correct this issue?
>
> I could correct this problem directly on the web servers with this
> program: https://www.nartac.com/Products/IISCrypto/Default.aspx
>
> Thanks for your help.
>
> Regards,
>
> Christophe
>
>
>
>

Reply via email to