MINOR: connection: add a new error code for SSL with heartbeat
Users have seen a huge increase in the rate of SSL handshake failures starting from 2014/04/08 with the release of the Heartbleed OpenSSL vulnerability (CVE-2014-0160). Haproxy can detect that a heartbeat was received in the incoming handshake, and such heartbeats are not supposed to be common, so let's log a different message when a handshake error happens after a heartbeat is detected. This patch only adds the new message and the new code.
This commit is contained in:
parent
73025dd7e2
commit
b3966377d8
|
@ -581,6 +581,7 @@ static inline const char *conn_err_code_str(struct connection *c)
|
|||
case CO_ER_SSL_CA_FAIL: return "SSL client CA chain cannot be verified";
|
||||
case CO_ER_SSL_CRT_FAIL: return "SSL client certificate not trusted";
|
||||
case CO_ER_SSL_HANDSHAKE: return "SSL handshake failure";
|
||||
case CO_ER_SSL_HANDSHAKE_HB: return "SSL handshake failure after heartbeat";
|
||||
case CO_ER_SSL_NO_TARGET: return "Attempt to use SSL on an unknown target (internal error)";
|
||||
}
|
||||
return NULL;
|
||||
|
|
|
@ -162,6 +162,7 @@ enum {
|
|||
CO_ER_SSL_CA_FAIL, /* client cert verification failed in the CA chain */
|
||||
CO_ER_SSL_CRT_FAIL, /* client cert verification failed on the certificate */
|
||||
CO_ER_SSL_HANDSHAKE, /* SSL error during handshake */
|
||||
CO_ER_SSL_HANDSHAKE_HB, /* SSL error during handshake with heartbeat present */
|
||||
CO_ER_SSL_NO_TARGET, /* unkonwn target (not client nor server) */
|
||||
};
|
||||
|
||||
|
|
Loading…
Reference in New Issue