Thanks, all, for your help!




For your questions:



I use openssl 0.9.8



Haproxy -vv:







[root@proxy-au51 ~]# haproxy -vv

HA-Proxy version 1.5.9 2014/11/25

Copyright 2000-2014 Willy Tarreau <[email protected]>



Build options :

  TARGET  = linux26

  CPU     = i686

  CC      = gcc

  CFLAGS  = -m32 -march=i686 -O2 -march=i686 -g -fno-strict-aliasing

  OPTIONS = USE_LINUX_SPLICE=1 USE_LINUX_TPROXY=1 USE_LIBCRYPT=1 USE_OPENSSL=1 
USE_PCRE=1



Default settings :

  maxconn = 2000, bufsize = 16384, maxrewrite = 8192, maxpollevents = 200



Encrypted password support via crypt(3): yes

Built without zlib support (USE_ZLIB not set)

Compression algorithms supported : identity

Built with OpenSSL version : OpenSSL 0.9.8b 04 May 2006

Running on OpenSSL version : OpenSSL 0.9.8e-fips-rhel5 01 Jul 2008

OpenSSL library supports TLS extensions : yes

OpenSSL library supports SNI : no (version might be too old, 0.9.8f min needed)

OpenSSL library supports prefer-server-ciphers : yes

Built with PCRE version : 6.6 06-Feb-2006

PCRE library supports JIT : no (USE_PCRE_JIT not set)

Built with transparent proxy support using: IP_TRANSPARENT IPV6_TRANSPARENT 
IP_FREEBIND



Available polling systems :

      epoll : pref=300,  test result OK

       poll : pref=200,  test result OK

     select : pref=150,  test result OK

Total: 3 (3 usable), will use epoll.



Currently only the server requires authentication in TLS only (!) and the 
haproxy configured as check verify none for all servers.













-----Original Message-----
From: Lukas Tribus [mailto:[email protected]]
Sent: Wednesday, December 02, 2015 11:25 AM
To: Igor Cicimov
Cc: Cohen Galit; HAProxy
Subject: RE: SSLv2Hello is disabled



>>>> javax.net.ssl.SSLHandshakeException: SSLv2Hello is disabled

>>> You need to disable SSLv3 in haproxy

>>

>> We are talking about the SSLv2 hello format. Its not about SSLv2

>> or SSLv3, its about the hello format.

> Which can also be used by sslv3 clients hence my comment.



True, but disabling or enabling SSLv3 doesn't impact the hello format

behavior in OpenSSL afaik.







> However, haproxy unconditionally sets SSL_OP_NO_SSLv2, which

> makes openssl not use the SSLv2 Hello, so I don't see why this would

> happen.



This is the openssl behavior since 0.9.8:

http://cp.mcafee.com/d/avndxNJ5xwQsToupK-rKrjhpKCOyyCYrhhhsKYUM-qejqqbdSknxPP9IKyr8WvavmGj-0a3SUXOVIfrzLbCXKL4fvsvW_cEThuKPRXBQSrIsUMyyY-NR4kRHFGTohVkffGhBrwqrhdECXY-UUOYevovsdTdAVPmEBC4pj9JAenOGTMFg_aHv2B3YnlBfbemjZB5BZ11OPHGq90wNp2X-IL6zB4w-WwxZS3hOe76PSOFoKOe1heINfBPqrybxI5zihEw61waCkMLVVZjh1axEwgBji1_E6QT3uqJKGV6N



Maybe the OP uses an ancient openssl version (<= 0.9.7).

Galit, can you provide the ouput of "haproxy -vv"?

Also please clarify if you are authenticating the client and/or the server.



Providing a tcpdump of this failed handshake would also be helpful.







Regards,



Lukas





________________________________
"This e-mail message may contain confidential, commercial or privileged 
information that constitutes proprietary information of Xura, Inc. or its 
subsidiaries. If you are not the intended recipient of this message, you are 
hereby notified that any review, use or distribution of this information is 
absolutely prohibited and we request that you delete all copies and contact us 
by e-mailing to: [email protected]. Thank You."

Reply via email to