On Friday, January 16th, 2026 at 09:07, Willy Tarreau <[email protected]> wrote:

> On Thu, Jan 15, 2026 at 12:25:12PM +0000, Simon Ser wrote:
> 
> > Add the PP2_SUBTYPE_SSL_CERT code point reservation in the proxy
> > protocol specification. This is useful in cases where the backend
> > needs to perform mTLS authentication, but the rules for certificate
> > validation are backend-specific (e.g. database of allowed
> > certificate hashes).
> 
> Thanks. I thought it was already being passed, but apparently not,
> it was only the info of whether or not it's valid. Given how ambiguous
> everything is in proxies and in SSL, may I suggest that you call it
> "PP2_SUBTYPE_SSL_CLIENT_CERT" (explicitly add the notion of client) ?
> Otherwise if later we have to do the same for the server, for whatever
> reason, it would become very confusing.

Sure, sounds good!

> > @@ -672,6 +674,10 @@ The second level TLV PP2_SUBTYPE_SSL_SIG_SCHEME 
> > provides the US-ASCII string
> > name of the algorithm the frontend used to sign the ServerKeyExchange or
> > CertificateVerify message, for example "rsa_pss_rsae_sha256".
> > 
> > +The optional second level TLV PP2_SUBTYPE_SSL_CERT provides the raw X.509
> > +client certificate encoded in ASN.1 DER. The frontend may choose to omit 
> > this
> > +TLV depending on configuration.
> > +
> 
> Is this something we can already do using the manual TLV encoding in
> haproxy, or is this something you have added support for in another
> implementation ? I'm asking because as you see, I'm not super familiar
> with everything that can currently be done, and am making sure that users
> seeking exactly this and finding it in the doc will know how to exploit it.

I've added support for this in another implementation [1] [2]. haproxy
itself doesn't support it at this time. Is haproxy support required to
add PROXY protocol features?

Thanks,

Simon

[1]: https://codeberg.org/emersion/tlstunnel/pulls/33
[2]: https://codeberg.org/emersion/soju/pulls/356


Reply via email to