Hi,
On 21.10.2014 16:26, John Leach wrote:
> Hi,
>
> I'm trying to disable sslv3 with the "no-sslv3" bind option, but it's
> not working.
>
> The option is accepted and the restart is successful, but sslv3 is still
> accepted:
>
> $ openssl s_client -ssl3 -connect localhost:443
>
> New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
> Server public key is 1024 bit
> Secure Renegotiation IS supported
> Compression: NONE
> Expansion: NONE
> SSL-Session:
> Protocol : SSLv3
> Cipher : DHE-RSA-AES256-SHA
> Session-ID:
> D74EC1760F565669B7CD8D21636D05AABC9E047DAC94133E62240B3824EB8176
> Session-ID-ctx:
> Master-Key:
> 11417200F033C2B542B4FA3A7DC3C00214EFE92C7709FD406014D047D75DBA40573447ED5808962211AF323860367DEE
> Key-Arg : None
> PSK identity: None
> PSK identity hint: None
> SRP username: None
> Start Time: 1413900818
>
> double checked with nmap.
>
> Tested with haproxy 1.5.3 and 1.5.4 on Ubuntu 14.10, Fedora 20 and Centos 7.
>
> Config is as simple as:
>
>
> frontend myfrontend
> bind 0.0.0.0:443 ssl crt /etc/haproxy/mycert.pem no-sslv3
> default_backend mybackend
> reqadd X-Forwarded-Proto:\ https
Ive checked your config on centos 7 with the official version 1.5.2 and
it works.
--
# openssl s_client -ssl3 -connect 127.0.0.1:443
CONNECTED(00000003)
139825192679328:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert
handshake failure:s3_pkt.c:1257:SSL alert number 40
139825192679328:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl
handshake failure:s3_pkt.c:596:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : 0000
Session-ID:
Session-ID-ctx:
Master-Key:
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
Start Time: 1413903320
Timeout : 7200 (sec)
Verify return code: 0 (ok)
---
>
> I've also tried disabling tls too, and that seems to have no effect either.
>
> Lots of people are recommending this as a fix against the POODLE vuln,
> so it's quite critical! Any thoughts?
Could you post haproxy -vv?
Where does you package come from? Did you compile it by yourself?
> Thanks,
>
> John.
> --
> http://brightbox.com
>
>
cheers
thomas