Hello all,

I was installing relayd as a loadbalancer (and ssl terminator)  on
OpenBSD6.0
amd64 base install,

I used the following configuration for my /etc/relayd.conf file

http protocol https {
        match request header append "X-Forwarded-For" value "$REMOTE_ADDR"
        match request header append "X-Forwarded-By" \
            value "$SERVER_ADDR:$SERVER_PORT"
        match request header append "X-Forwarded-Proto" value "https"
        match request header set "Connection" value "close"
        tls { no tlsv1.0, ciphers HIGH }
}

The Site I used to test was
https://www.ssllabs.com/ssltest/

according to qualys the result for my site was a fail (F)
due to the following ciphers being supported by relayd / LibreTLS


TLS_ECDH_anon_WITH_AES_256_CBC_SHA (0xc019)   INSECURE     256
TLS_ECDH_anon_WITH_AES_128_CBC_SHA (0xc018)   INSECURE     128
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA (0xc017)   INSECURE     112

I was wondering if these ciphers could be disabled by default
in the upcoming release (if not already done so) I will investigate
selecting ciphers manually to exclude those ciphers in the mean time.

Thanks for your Time,

Reply via email to