> Le 23 mars 2017 à 12:25, Willy Tarreau <[email protected]> a écrit : > > On Thu, Mar 23, 2017 at 11:26:50AM +0100, Emmanuel Hocdet wrote: >> Emeric's suggestion is not on the ML. > > I transcripted it in the other e-mail of this same thread. > >> If no- and force- are defined as deprecated it can make a difference. >> I'm not used to seeing this kind of proposal for haproxy configuration ;-) > > The purpose is not to deprecate them but to "emulate" them and only > to deprecate those causing trouble. > Ok, this is what I propose.
>> (for the hole, openssl low leveling the range: no-tlsv1.1 become >> max-tlsv1.0) > > Here for me, no-tlsv1.1 alone would be rejected because it's ambigous as it > either means max-tlsv1.0 or min-tlsv1.2. However if you have : > I agree, haproxy should, at least, warm in this case. It’s in my todo, waiting for more feedback on my patches. > no-sslv3 no-tlsv1.0 no-tlsv1.1 > > Then there's no ambiguity, only tlsv1.2 remains. Conversely : > > no-tlsv1.1 no-tlsv1.2 > > Restricts us to sslv3 and tlsv1.0. > > So in fact we know the bounds we support and we convert a contigous range > into a min+max. Discontinuities are rejected and it should not be a problem. > Emeric told me that he knows some deployments where people rejected recent > versions due to interoperability issues, but there's no reason for blocking > only a middle version and not either older or newer ones. > Yep, perhaps continue to discuss in the treads with my patches. > I know Emeric is busy at the moment so I don't expect him to read this > thread yet :-) > Manu

