pon., 21 sty 2019 o 00:10 Adam Langley <[email protected]> napisaƂ(a):
> No idea, I'm afraid. If you have a server to test, it looks like one
> can use OpenSSL 1.1.1's `openssl s_client` tool to send a KeyUpdate
> message by writing "K" on a line by itself.

I tested all my servers and I've noticed that nginx is broken too. I
am running nginx 1.14.2 with OpenSSL 1.1.1a The nginx source contains
exactly the same function as haproxy:
https://trac.nginx.org/nginx/browser/nginx/src/event/ngx_event_openssl.c?rev=ebf8c9686b8ce7428f975d8a567935ea3722da70#L850

However, it seems that it might have been fixed in 1.15.2 by this commit:
https://trac.nginx.org/nginx/changeset/e3ba4026c02d2c1810fd6f2cecf499fc39dde5ee/nginx/src/event/ngx_event_openssl.c

It might also be a better approach for haproxy to just use
SSL_OP_NO_RENEGOTIATION if possible. Older OpenSSL versions do no have
it, but they also don't support TLS 1.3

And just for reference, I've found Chrome bug with this problem (as I
am interested when this will get enabled to keep all my systems
updated) https://bugs.chromium.org/p/chromium/issues/detail?id=923685

-- 
Janusz Dziemidowicz

Reply via email to