RE: Issues with force-sslv3

2015-07-03 Thread Lukas Tribus
Hi, Hi there, I'm running haproxy 1.5.12 and I have set 'ssl-default-bind-options no-sslv3 no-tlsv10' (without the quotes of course) under the global section as I want all my front-ends not to support SSLv3 or TLS1.0. However I do have a client that still requires SSLv3 support (for

Issues with force-sslv3

2015-07-03 Thread Travis Fitch
Hi there, I'm running haproxy 1.5.12 and I have set 'ssl-default-bind-options no-sslv3 no-tlsv10' (without the quotes of course) under the global section as I want all my front-ends not to support SSLv3 or TLS1.0. However I do have a client

Re: [PATCH] DOC: dns: fix chapters syntax

2015-07-03 Thread Willy Tarreau
On Thu, Jul 02, 2015 at 10:45:32PM +0200, Cyril Bonté wrote: All chapters in the configuration documentation used to follow this syntax : chapter number. title - (...) Applied, thanks Cyril! Willy

simple DOS mitigation (and maxconn)

2015-07-03 Thread Olivier
Hello, We experienced a specific behaviour with HAProxy (1.5.12) and would like to share what happened, and see what can be done. Simplified configuration : defaults default-server maxconn 2000 backlog 16384 listen webcustomer:80 id 12 balance source hash-type consistent

Poor Performance of www.haproxy.org over ipv6

2015-07-03 Thread Sebastian Schubert
hi there, while downloading the latest release, i was wondering why i only got 10kb/s while getting the tarball... i rechecked and saw that the performance was ok using ipv4, but very poor for ipv6 (the records seem to point to different machines btw.) wget with ipv4: 2015-07-03 18:15:45

Re: [ANNOUNCE] haproxy-1.5.14

2015-07-03 Thread Marc-Antoine
Hi, just to let you know changelog is missing 1.5.14 infos ;) great job by the way ! On Fri, 3 Jul 2015 17:55:56 +0200, Willy Tarreau w...@1wt.eu wrote : Changelog: http://www.haproxy.org/download/1.5/src/CHANGELOG -- Marc-Antoine

Re: [ANNOUNCE] haproxy-1.5.13

2015-07-03 Thread Willy Tarreau
On Fri, Jul 03, 2015 at 08:09:34AM +0200, Marco Corte wrote: Il 26/06/2015 15:57, Willy Tarreau ha scritto: Another one is an issue that was reported in 1.5.12 with peers trying to immediately reconnect upon error and eating a lot of CPU. Both peers in that cluster are running 1.5.13 and I

Re: [ANNOUNCE] haproxy-1.5.13

2015-07-03 Thread Willy Tarreau
On Thu, Jul 02, 2015 at 09:36:28AM +0200, Pavlos Parissis wrote: On 26/06/2015 03:57 , Willy Tarreau wrote: Hi, as promise, here comes 1.5.13. It's been 1.5 months already since 1.5.12 and my misleading announce of the backport of peers support for nbproc :-) You forgot to

RE: [ANNOUNCE] haproxy-1.5.14

2015-07-03 Thread Lukas Tribus
Hi, just to let you know changelog is missing 1.5.14 infos ;) Its there, its probably just cached in your browser (try ctrl+shift+R). Lukas

Re: Poor Performance of www.haproxy.org over ipv6

2015-07-03 Thread Willy Tarreau
Hi Sebastian, On Fri, Jul 03, 2015 at 06:31:04PM +0200, Sebastian Schubert wrote: hi there, while downloading the latest release, i was wondering why i only got 10kb/s while getting the tarball... i rechecked and saw that the performance was ok using ipv4, but very poor for ipv6 (the

[ANNOUNCE] haproxy-1.5.14

2015-07-03 Thread Willy Tarreau
Hi all, This week, Charlie Smurthwaite reported a bug in haproxy 1.5 affecting SVN in pipeline mode. After a long debugging session and many very detailed traces Charlie provided, we found the bug and it has even more serious impacts than initially thought. To make a long story short, with the

Re: [PATCH] MAJOR: connection: fix TLV offset calculation for proxy protocol v2 parsing

2015-07-03 Thread Willy Tarreau
On Fri, Jul 03, 2015 at 02:09:10PM +0200, KOVACS Krisztian wrote: Until now, the code assumed that it can get the offset to the first TLV header just by subtracting the length of the TLV part from the length of the complete buffer. However, if the buffer contains actual data after the header,

RE: Issues with force-sslv3

2015-07-03 Thread Lukas Tribus
Thanks Lukas, So its either SSLv3 is enable for all, or its disable for all? No, you can disable it per bind line, only that you need to do it the other way around, specifying no-sslv3 on all other bind lines, not the one where you need sslv3 (and not in the defaults). Lukas

Re:detergent chemicals SLES 70

2015-07-03 Thread Sinotechem
Dear Sir or Madam, Nice day! This is Taurin from SINOTEC INDUSTRIAL GROUP CO.,LTD, a professional and leading Chemicals manufacturer in China, since 1994. We have big advantages in the following products, SLES - Sodium Lauryl Ether Sulfate; LABSA - Linear Alkyl Benzene Sulphonic Acid;

Re: Issues with force-sslv3

2015-07-03 Thread Travis Fitch
Thanks Lukas, So its either SSLv3 is enable for all, or its disable for all? Is there a way to have SSLv3 enabled for one backend only? - Travis On 4/07/2015 1:01 am, Lukas Tribus wrote: Hi, Hi there, I'm running haproxy 1.5.12 and I have set 'ssl-default-bind-options no-sslv3

China DHL Freight

2015-07-03 Thread ljwafa
Why want to use our DHL account? Our DHL account proivde lowwerChina DHL ratesthan your DHL account We can pick up anywhere in China, Chinese DHL only can pick up from big cities in China We ready all documents to both DHL and destination customs cleaance. We colloect from different place

RE: Now follows SNI rules, except from curl on OSX

2015-07-03 Thread Lukas Tribus
That should have read: The capture shows that there is *no* SNI emitted by the client. I think your node.js SNI tests was bogus, and that curl doesn't properly support SNI *if* the crypto library is SecureTransport instead of openssl, gnutls or cyassl.

Re: Now follows SNI rules, except from curl on OSX

2015-07-03 Thread AJ ONeal (Home)
Try: curl https://sni.velox.ch/ -k You will see that SNI doesn't work with this client. Also see: https://mumble.org.uk/blog/2014/03/12/gpg-and-openssl-and-curl-and-osx/ I'm a little confused... because I see that you're correct about https://sni.velox.ch in that I see an error message

RE: Now follows SNI rules, except from curl on OSX

2015-07-03 Thread Lukas Tribus
Yep, it's OS X curl.    curl 7.37.1 (x86_64-apple-darwin14.0) libcurl/7.37.1  SecureTransport zlib/1.2.5  Protocols: dict file ftp ftps gopher http https imap imaps ldap  ldaps pop3 pop3s rtsp smtp smtps telnet tftp  Features: AsynchDNS GSS-Negotiate IPv6 Largefile NTLM NTLM_WB SSL libz   

Re: Now follows SNI rules, except from curl on OSX

2015-07-03 Thread AJ ONeal (Home)
The big question is why does curl on mac somethimes send the SNI value and sometimes not? Maybe it has someting todo with the -k/--insecure argument? Which certificate are you getting if you do: curl --insecure https://coolaj86.com BINGO! Ugh... well, at least some half-decent

Re: [ANNOUNCE] haproxy-1.5.13

2015-07-03 Thread Marco Corte
Il 26/06/2015 15:57, Willy Tarreau ha scritto: Another one is an issue that was reported in 1.5.12 with peers trying to immediately reconnect upon error and eating a lot of CPU. Both peers in that cluster are running 1.5.13 and I do not see the behaviour any more. Thank you! .marcoc

RE: Now follows SNI rules, except from curl on OSX

2015-07-03 Thread Lukas Tribus
sudo tcpdump -ps0 -i eth0 -w eth0.64443.cap tcp port 64443 And then this on my Yosemite Mac curl --insecure https://baz.example.com:64443https://baz.example.com:64443/ And here's the result The capture shows that there is now SNI emitted by the client. I think your

Re: Now follows SNI rules, except from curl on OSX

2015-07-03 Thread Cyril Bonté
Hi, Le 03/07/2015 04:26, AJ ONeal (Home) a écrit : Sounds like that client hello from curl@mac looks different than we expect, therefor SNI parsing fails. Can you provide the same tcpdump captures again, this time from the mac curl client that fails? I ran this on the server

CE bulbs

2015-07-03 Thread tom
=DearSir,Areyouinterestingledbulbs? =20 Weareprofessionalledhighbaymanuf=actureinChina, ourle=dhighbayhavepassedCE,ROHSandULcertification,canprovide3yea=rswarranties,detailsyoucanfindbelowinformation,anymoreinform=ation,pleasesendmeemailswith95%discount.

[SPAM] RE:VOCE E CONVIDADO

2015-07-03 Thread ALEX TREVAL TURISMO
Seu cliente de e-mail não pode ler este e-mail. Para visualizá-lo on-line, por favor, clique aqui: http://comprasnoparaguay23.net/display.php?M=426C=0756d1e8cdaf638b4892e93319565405S=6L=1N=1 Para parar de receber nossos

[PATCH] MAJOR: connection: fix TLV offset calculation for proxy protocol v2 parsing

2015-07-03 Thread KOVACS Krisztian
Until now, the code assumed that it can get the offset to the first TLV header just by subtracting the length of the TLV part from the length of the complete buffer. However, if the buffer contains actual data after the header, this computation is flawed and leads to haproxy trying to parse TLV