Re: [PATCH] skip reg-tests/connection/proxy_protocol_send_unique_id_alpn.vtc on CentOS 6

2020-05-27 Thread Илья Шипицин
There were bug reports if centos 6 is broken. Which means people actively use it On Thu, May 28, 2020, 3:21 AM Tim Düsterhus wrote: > Ilya, > > Am 27.05.20 um 22:53 schrieb Илья Шипицин: > > Hello, > > > > let us skip new test on CentOS6 > > > > There definitely should be a smarter solution

Re: stable-bot: Bugfixes waiting for a release 2.1 (52), 2.0 (45)

2020-05-27 Thread Willy Tarreau
Hi Tim, On Wed, May 27, 2020 at 04:33:47PM +0200, Tim Düsterhus wrote: > I already asked 2 weeks ago [1], but I'll ask again: > > > Is there any date planned for 2.1.5? I'm still running 2.1.3 on one > > machine, because I use Dovecot. > > And I only just realize that 2.1.3 is affected by

Re: [PATCH] skip reg-tests/connection/proxy_protocol_send_unique_id_alpn.vtc on CentOS 6

2020-05-27 Thread Tim Düsterhus
Ilya, Am 27.05.20 um 22:53 schrieb Илья Шипицин: > Hello, > > let us skip new test on CentOS6 > There definitely should be a smarter solution than "delete test" to skip tests that depend on OpenSSL's features. Or maybe we should just get rid of CentOS 6 tests, it will be end of life on

[PATCH] skip reg-tests/connection/proxy_protocol_send_unique_id_alpn.vtc on CentOS 6

2020-05-27 Thread Илья Шипицин
Hello, let us skip new test on CentOS6 Cheers, Ilya Shipitcin From 4585b4f3b3f6dcbef071b36e7a589cd89757818e Mon Sep 17 00:00:00 2001 From: Ilya Shipitsin Date: Thu, 28 May 2020 01:50:57 +0500 Subject: [PATCH] CI: cirrus-ci: skip reg-tests/connection/proxy_protocol_send_unique_id_alpn.vtc on

Re: [PATCH] cleanup coverity findging (make it silent)

2020-05-27 Thread Илья Шипицин
well, I do not have an idea why extchk_setenv(check, EXTCHK_HAPROXY_SERVER_ADDR, check->argv[3]); is used instead of EXTCHK_SETENV(check, EXTCHK_HAPROXY_SERVER_ADDR, check->argv[3], err); it means, some environment variables are set in "best effort" mode, i.e. error is ignored. is it bad ?

Re: Redefine 401 error page

2020-05-27 Thread Willy Tarreau
Hi Christopher, On Wed, May 27, 2020 at 07:03:58PM +0200, Christopher Faulet wrote: > Here are patches to handle customizable 401/407 messages. In fact, only the > second patch is really meaningful. There is no change for the http-request > auth rule from the configuration point of view.

range queries (my favourite)

2020-05-27 Thread Илья Шипицин
hello, how does haproxy serves queries like that: Range: bytes=0-,0-,0-,0-, more info: https://www.zdnet.com/article/rangeamp-attacks-can-take-down-websites-and-cdn-servers/ Cheers, Ilya Shipitcin

Re: Redefine 401 error page

2020-05-27 Thread Christopher Faulet
Le 26/05/2020 à 10:22, Christopher Faulet a écrit : In HAProxy 2.2, I guess 401/407 responses may be generated using an http-request return rule, making http-request auth rule more or less deprecated. The only mess is to handle 2 different responses depending on the request path when the

Re: stable-bot: Bugfixes waiting for a release 2.1 (52), 2.0 (45)

2020-05-27 Thread Tim Düsterhus
Hi List, Willy, Am 27.05.20 um 02:00 schrieb stable-...@haproxy.com: > Last release 2.1.4 was issued on 2020-04-02. There are currently 52 patches > in the queue cut down this way: > - 1 MAJOR, first one merged on 2020-05-20 > - 20 MEDIUM, first one merged on 2020-05-01 > - 31

Re: [PATCH] REGTEST: Add connection/proxy_protocol_send_unique_id_alpn

2020-05-27 Thread Tim Düsterhus
Christopher, Am 27.05.20 um 13:38 schrieb Christopher Faulet: > Thanks Tim. Now applied. > Ugh. I realize that I messed up all the commit hashes within the commit message, because I've taken the hashes from my testing branch where I cherry-picked them onto an old commit to verify the test fails

Re: RFC: set minimum default TLS version to 1.2 for HAProxy 2.2

2020-05-27 Thread Lukas Tribus
Hello, On Wed, 27 May 2020 at 13:33, Илья Шипицин wrote: > ср, 27 мая 2020 г. в 16:09, Tim Düsterhus : >> >> William, >> >> Am 27.05.20 um 12:40 schrieb William Lallemand: >> > Hello List, >> > >> > Since HAProxy 1.8, the minimum default TLS version for bind lines is >> > TLSv10. I was thinking

Re: RFC: set minimum default TLS version to 1.2 for HAProxy 2.2

2020-05-27 Thread Tim Düsterhus
Ilya, Am 27.05.20 um 13:33 schrieb Илья Шипицин: >> As a data point: >> >> The OpenSSL shipped with Debian Buster does not support anything below >> TLS 1.2 by default [1]. The same is true starting with Ubuntu 20.04 LTS. >> > > > I know several real-world cases when people had to build their

Re: HAproxy 2.X RPM

2020-05-27 Thread Julien Pivotto
On 27 May 12:27, Loïc Chanel wrote: > Hello, > > Do any of you guys know where I could find RPM files for 2.0 or 2.1 version > ? > I am looking for a public repository offering an automated build of HAproxy > 2.X, but all I could find until now was this repo : >

Re: RFC: set minimum default TLS version to 1.2 for HAProxy 2.2

2020-05-27 Thread Julien Pivotto
On 27 May 12:40, William Lallemand wrote: > Hello List, > > Since HAProxy 1.8, the minimum default TLS version for bind lines is > TLSv10. I was thinking to increase this minimum default to TLSv11 before > the 2.2 release. But when we discussed the other day about the DH > param set to 2048 by

Re: [PATCH] REGTEST: Add connection/proxy_protocol_send_unique_id_alpn

2020-05-27 Thread Christopher Faulet
Le 27/05/2020 à 12:58, Tim Duesterhus a écrit : Christopher, as mentioned in my comment in #640 I wrote a test that verifies that unique IDs via PPv2 continue to work or ALPN servers in the future: https://github.com/haproxy/haproxy/issues/640#issuecomment-634117124 The test does the

Re: RFC: set minimum default TLS version to 1.2 for HAProxy 2.2

2020-05-27 Thread Илья Шипицин
ср, 27 мая 2020 г. в 16:09, Tim Düsterhus : > William, > > Am 27.05.20 um 12:40 schrieb William Lallemand: > > Hello List, > > > > Since HAProxy 1.8, the minimum default TLS version for bind lines is > > TLSv10. I was thinking to increase this minimum default to TLSv11 before > > the 2.2 release.

Re: RFC: set minimum default TLS version to 1.2 for HAProxy 2.2

2020-05-27 Thread Tim Düsterhus
William, Am 27.05.20 um 12:40 schrieb William Lallemand: > Hello List, > > Since HAProxy 1.8, the minimum default TLS version for bind lines is > TLSv10. I was thinking to increase this minimum default to TLSv11 before > the 2.2 release. But when we discussed the other day about the DH > param

[PATCH] REGTEST: Add connection/proxy_protocol_send_unique_id_alpn

2020-05-27 Thread Tim Duesterhus
Christopher, as mentioned in my comment in #640 I wrote a test that verifies that unique IDs via PPv2 continue to work or ALPN servers in the future: https://github.com/haproxy/haproxy/issues/640#issuecomment-634117124 The test does the bare minimum, receiving a single unique ID. The

Re: RFC: set minimum default TLS version to 1.2 for HAProxy 2.2

2020-05-27 Thread Илья Шипицин
as a person running pretty large load balancer installation, I confirm there are a lot of usages of TLS10. for example, depending on .net version, default setting might be TLS1.0 if you run .net 4.5 the ability to turn TLS1.0 without recompile is the must thing to have. I'm even not sure about

RFC: set minimum default TLS version to 1.2 for HAProxy 2.2

2020-05-27 Thread William Lallemand
Hello List, Since HAProxy 1.8, the minimum default TLS version for bind lines is TLSv10. I was thinking to increase this minimum default to TLSv11 before the 2.2 release. But when we discussed the other day about the DH param set to 2048 by default, I read that RHEL 8 was also disabling TLSv11 by

HAproxy 2.X RPM

2020-05-27 Thread Loïc Chanel
Hello, Do any of you guys know where I could find RPM files for 2.0 or 2.1 version ? I am looking for a public repository offering an automated build of HAproxy 2.X, but all I could find until now was this repo : http://au1.mirror.crc.id.au/repo/el7-extra/x86_64/ and I don't know if the owner