Hi Manu,

On 03/16/2017 02:44 PM, Emeric Brun wrote:
> On 03/15/2017 07:06 PM, Willy Tarreau wrote:
>> Hi Manu,
>>
>> On Wed, Mar 15, 2017 at 07:00:28PM +0100, Emmanuel Hocdet wrote:
>>>> ssl_options seems still valid, all directives can be mapped to it and keep 
>>>> compatibility.
>>>>
>>>
>>> Patch proposal:
>>  
>> Maybe it could work, let's wait for Emeric's feedback. I remember there
>> was a subtle difference between no-<version> and force-<version> but I
>> don't remember which one.
>>
>> Thanks,
>> Willy
>>
> 
> 
> I'm clearly not sure that setting openssl's options to ~no-tlsxx have the 
> same behavior than forcing the callback sets (using force-) to one protocol.
> 
> I always suspected that no-tlsxx options applies on a kind of 'capabilities' 
> where as setting a callback-set clearly force the usage of a protocol version.
> 
> So for me the patch could modify some behavior for openssl versions < 1.1
> 
> There is another point which worries me:
> 
> In the proposed patch, statement 'force-' will disable all known protocol 
> version except that one.
> 
> But we will face issue using 'force-' when openssl will support further tls 
> versions not yet handled by haproxy. This problem was correctly handled by 
> the previous implementation.
> 
> R,
> Emeric
> 

Finally, 

To avoid side effects as explained below, i think it would be better to use 
SSL_CTX_set_min_proto_version/SSL_CTX_set_max_proto_version, setting min = max 
to forced version
using 'force-' statements.





Reply via email to