Hi Patrick,

> While going through the Qualys SSL test  
> (https://www.ssllabs.com/ssltest), one of the items it mentions is a  
> DoS vulnerability in regards to client-side initiated SSL renegotiation  
> (https://community.qualys.com/blogs/securitylabs/2011/10/31/tls-renegotiation-and-denial-of-service-attacks).
>   
> While researching the subject, it seems that the only reliable way to  
> mitigate the issue is in the server software. Apache has implemented  
> code to disable renegotiation. Would it be possible to add an option in  
> haproxy to disable it?

Looks like its already disabled by default?

https://www.ssllabs.com/ssltest/analyze.html?d=demo.1wt.eu

---> Secure Client-Initiated Renegotiation:
                                No
---> Insecure Client-Initiated Renegotiation:
                                No



Regards,

Lukas

                                          

Reply via email to