Yes, please reproduce with latest snapshot, and provide the output
of haproxy -vv. Also, setup haproxy so it can generate a core.


Make sure you CC the list [email protected] when responding.


Thanks,
Lukas


________________________________
> Date: Fri, 3 May 2013 11:14:14 +0200 
> Subject: Re: haproxy crashes with ddos mitigation config 
> From: [email protected] 
> To: [email protected] 
> 
> Below is my haproxy -vv : 
> 
> A-Proxy version 1.5-dev18 2013/04/03 
> Copyright 2000-2013 Willy Tarreau <[email protected]<mailto:[email protected]>> 
> 
> Build options : 
> TARGET = linux2628 
> CPU = generic 
> CC = gcc 
> CFLAGS = -O2 -g -fno-strict-aliasing 
> OPTIONS = USE_OPENSSL=1 USE_PCRE=1 
> 
> Default settings : 
> maxconn = 2000, bufsize = 16384, maxrewrite = 8192, maxpollevents = 200 
> 
> Encrypted password support via crypt(3): yes 
> Built without zlib support (USE_ZLIB not set) 
> Compression algorithms supported : identity 
> Built with OpenSSL version : OpenSSL 0.9.8o 01 Jun 2010 
> OpenSSL library supports TLS extensions : yes 
> OpenSSL library supports SNI : yes 
> OpenSSL library supports prefer-server-ciphers : yes 
> 
> Available polling systems : 
> epoll : pref=300, test result OK 
> poll : pref=200, test result OK 
> select : pref=150, test result OK 
> Total: 3 (3 usable), will use epoll. 
> 
> I'll try the snapshot 
> 
> ---------------------------------------------------------------------------------------
>  
> 
> 
> Regarding the ddos mitigation config on non ssl frontend, it doesn't 
> seem to work properly. 
> My frontend config 
> ... 
> frontend public 
> bind 0.0.0.0:80<http://0.0.0.0:80> 
> 
> # # Table definition 
> stick-table type ip size 5m expire 30s store conn_cur 
> 
> # # Allow clean known IPs to bypass the filter 
> # tcp-request connection accept if { src -f /etc/haproxy/whitelist.lst } 
> # # Shut the new connection as long as the client has already 10 opened 
> tcp-request connection reject if { src_conn_cur ge 10 } 
> tcp-request connection track-sc1 src 
> 
> mode http 
> log global 
> option httplog 
> timeout client 25s 
> maxconn 1000 
> timeout http-request 80s 
> capture request header Host len 64 
> capture request header Referer len 256 
> capture request header User-Agent len 64 
> ... 
> 
> 
> Then i open 10 connexions : 
> 
> ab -n 500000 -c 10 http://127.0.0.1:80/ 
> 
> I open another connexion with a telnet and i'm able to open it. 
> 
> watch 'echo "show table services" | socat unix:./haproxy.stats -' 
> 0xb5c6a4: key=127.0.0.1 use=11 exp=30000 conn_cur=11 
> 
> Maybe i should open a new thread ? 
> 
> Regards, 
> Smana                                           

Reply via email to