HAProxy, what else ????

Baptiste

On Fri, Apr 25, 2014 at 8:15 PM, Willy Tarreau <[email protected]> wrote:
> Just a quick note to let you know that Emeric and I have found how
> to detect heartbeats and the heartbleed attack at the application
> layer and how to block it regardless of the OpenSSL version. So we
> have added two new error messages for the logs depending on what
> type of handshake failure happens :
>
>    "SSL handshake failure after heartbeat"
>    "Stopped a TLSv1 heartbeat attack (CVE-2014-0160)"
>
> The first one indicates that a heartbeat was present in the request.
> While there is nothing dangerous there, it may indicate someone
> trying to elaborate an attack or just a bot checking for support or
> not. The second one is emitted if the attack is detected (and blocked).
>
> Just for a test, I have re-enabled the vulnerable 1.0.1c on demo.1wt.eu
> and can confirm that no single byte of memory is leaked, because we kill
> the connection before OpenSSL responds.
>
> This is in the latest git. I intend to issue dev24 this evening once I
> get the confirmation that the SSL DH changes are responsible for the
> performance regression that Sander experienced.
>
> In the mean time, any tests are welcome, as usual.
>
> Cheers,
> Willy
>
>

Reply via email to