Hi,

On Sun, Sep 07, pablo platt wrote:
> Hi,
> 
> I'm using haproxy to terminate SSL and it works for most of my users.
> I have alphassl wildcard certificate.
> I'm using SSL to improve WebSockets and RTMP connections of port 443.
> I don't have sensitive data or e-commerce.
> 
> I have one user that see a warning in Chrome and can't use my website.

Do you know what warning chrome gives to that user ?

> Is it possible that this the warning is because an antivirus is not happy
> with the default ciphers or other ssl settings?
> 
> When running a test https://sslcheck.globalsign.com/en_US I'm getting:
> Sessions may be vulnerable to BEAST attack
> Server has not enabled HTTP Strict-Transport-Security
> Server has SSL v3 enabled
> Server is using RC4-based ciphersuites which have known vulnerabilities
> Server configuration does not meet FIPS guidelines
> Server does not have OCSP stapling configured
> Server has not yet upgraded to a Extended Validation certificate
> Server does not have SPDY enabled
> 
> I found one suggestion:
> bind 10.0.0.9:443 name https ssl crt /path/to/domain.pem ciphers
> RC4:HIGH:!aNULL:!MD5
> http://blog.haproxy.com/2013/01/21/mitigating-the-ssl-beast-attack-using-the-aloha-load-balancer-haproxy/
> 
> And another:
> bind 0.0.0.0:443 ssl crt /etc/cert.pem nosslv3 prefer-server-ciphers
> ciphers RC4-SHA:AES128-SHA:AES256-SHA
> 
> Both gives me other warnings.

What other warnings ? (Does haproxy give you warnings/errors or client
browsers) ?

Perhaps you could try ciphersuite from:
https://wiki.mozilla.org/Security/Server_Side_TLS

for example in global:
ssl-default-bind-ciphers ...

or on bind:
bind 0.0.0.0:443 ssl crt /path/to/crt ciphers ...

To enable ocsp stapling see haproxy config:
http://cbonte.github.io/haproxy-dconv/configuration-1.5.html#5.1-crt
http://cbonte.github.io/haproxy-dconv/configuration-1.5.html#9.2-set%20ssl%20ocsp-response

-Jarno

-- 
Jarno Huuskonen

Reply via email to