> Le 22 mars 2017 à 16:30, Emmanuel Hocdet <[email protected]> a écrit : > […] > 0005 force-tlsxx implementation compatibility (Emeric first point) > > For the second point >> But we will face issue using 'force-' when openssl will support further tls >> versions not yet handled by haproxy. This problem was correctly handled by >> the previous implementation. > > I can provide a patch for that but it will not useful for years until a new > TLS will be implemented. It can generate build breaks until this time. > . all TLS methods are known in haproxy (set_options usage is safe) > . Haproxy must be run with the same version as the compilation. Change the > openssl version (other than for bug fix) is not supported.
By testing TLSv1.3 i noticed that per default, the version is disable and can’t be used until SSL_CTX_set_max_proto_version is set with TLS1_3_VERSION. So i will add a patch for SSL_CTX_set_max_proto_version with TLSv1.3 disable per default. This look like what you might have encountered with initial openssl development and force-tlsxx: activate a pending TLS version. Does that tell you something Emeric? Manu

