Hi,

On 23.06.2014 18:32, Vincent Bernat wrote:
>  ❦ 23 juin 2014 18:14 +0200, Markus Rietzler <w...@mrietzler.de> :
>
>> to switch off tls compression (because of beast/crime attack) with tls
>> v1.0 and compression.  can i deactivate it in haproxy too?
You should not add add a new thread to a existing one.
> haproxy disables SSL compression and there is no flag to enable
> it. However, disabling SSL compression is not available in OpenSSL
> 0.9.8. Which version of OpenSSL are you using?

Please have a look at
http://blog.haproxy.com/2013/01/21/mitigating-the-ssl-beast-attack-using-the-aloha-load-balancer-haproxy/
If you need support for PFS too, then try  lines like this
--
frontend fe_443
        bind :443 name https ssl crt /etc/haproxy/certs/mycert.pem
ciphers
ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:RC4-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK
        mode http
--
and in the global section
--
tune.ssl.default-dh-param <private key length but min 1024>
--
After that check your site again.


cheers,
thomas

Reply via email to