> Le 22 mars 2017 à 22:58, Willy Tarreau <[email protected]> a écrit :
> 
> On Wed, Mar 22, 2017 at 05:30:09PM +0100, Emmanuel Hocdet wrote:
>> I have patches sent in the ML who change the internal implementation of
>> no/force-tlsxx and add min/max-tlsxx (who can replace no/force usage).
>> It could simplify (or not)  what you want to do, but there will be an impact
>> on your patches if they are accepted.
> 
> Yes, as I said in the other mail I think that's on a good track but as
> Emeric suggested we'd rather have them provide an argument instead of
> using the keyword name, that will make it much easier to process. We
> can still support most older valid use cases and use warnings to explain
> how to convert that to the new mode (if really needed, not even sure) and
> emit errors explaining what to do for the situations that openssl does
> not support anymore (holes in the range).
> 

Emeric's suggestion is not on the ML.
If no- and force- are defined as deprecated it can make a difference.
I'm not used to seeing this kind of proposal for haproxy configuration ;-)
(for the hole, openssl low leveling the range:  no-tlsv1.1 become max-tlsv1.0)

++
Manu



Reply via email to