Hi,

I applied your patchs and then launch haproxy with this minimal conf :

--------

global
    tune.ssl.default-dh-param 4096

defaults
    timeout check 10s
    timeout client 180s
    timeout connect 2s
    timeout http-keep-alive 15s
    timeout http-request 10s
    timeout queue 60s
    timeout server 180s
    timeout tarpit 10s
    timeout tunnel 600s

listen tmp
    bind 127.0.0.1:8443 ssl crt tmp/ssl strict-sni
    redirect location https://www.google.fr

--------

and test all mode :

$ openssl s_client -connect 127.0.0.1:8443 -CApath /etc/ssl/certs
-servername dsa.toto.fr 2>/dev/null | openssl x509 -noout -text | grep
"Public Key Algorithm:"
            Public Key Algorithm: dsaEncryption
$ openssl s_client -connect 127.0.0.1:8443 -CApath /etc/ssl/certs
-servername ec.toto.fr 2>/dev/null | openssl x509 -noout -text | grep
"Public Key Algorithm:"
            Public Key Algorithm: id-ecPublicKey
$ openssl s_client -connect 127.0.0.1:8443 -CApath /etc/ssl/certs
-servername rsa.toto.fr 2>/dev/null | openssl x509 -noout -text | grep
"Public Key Algorithm:"
            Public Key Algorithm: rsaEncryption

is that enough for you ?

Regards,

2016-10-23 14:49 GMT+02:00 Thierry Fournier <[email protected]>:
> Hi list,
>
> I'm currently workibng on dynamic load of certificates, and I see somme
> minor bug. There are a few Patches.
>
> The first of them add some useful traces for debuging SSL
> (typically explain the reason of an handshake failure).
>
> The second and the third are 2 minor bug with return code not
> controlled.
>
> The fourth is the main patch. It remove some entries tore twice in the
> SNI tree. This bug is really minor.
>
> I valid my patches with a classic single certificate, and with dual
> certificate (DSA/RSA). I can't test dual or three certificates with
> ECDSA.
>
> My patches can be applied on the current master branch, and there
> are easy to apply on the 1.6 branch.
>
> Anyone can test the mode DSA + RSA + ECDSA ?
>
> Thanks
> Thierry

Reply via email to