mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2024-12-19 18:28:33 +00:00
5fc7d7e8ce
Clients that support ECC cipher suites SHOULD send the specified extension within the SSL ClientHello message according to RFC4492, section 5.1. We can use this extension to chain-proxy requests so that, on the same IP address, a ECC compatible clients gets an EC certificate and a non-ECC compatible client gets a regular RSA certificate. The main advantage of this approach compared to the one presented by Dave Zhu on the mailing list is that we can make it work with OpenSSL versions before 1.0.2. Example: frontend ssl-relay mode tcp bind 0.0.0.0:443 use_backend ssl-ecc if { req.ssl_ec_ext 1 } default_backend ssl-rsa backend ssl-ecc mode tcp server ecc unix@/var/run/haproxy_ssl_ecc.sock send-proxy-v2 check backend ssl-rsa mode tcp server rsa unix@/var/run/haproxy_ssl_rsa.sock send-proxy-v2 check listen all-ssl bind unix@/var/run/haproxy_ssl_ecc.sock accept-proxy ssl crt /usr/local/haproxy/ecc.foo.com.pem user nobody bind unix@/var/run/haproxy_ssl_rsa.sock accept-proxy ssl crt /usr/local/haproxy/www.foo.com.pem user nobody Signed-off-by: Nenad Merdanovic <nmerdan@anine.io> |
||
---|---|---|
.. | ||
design-thoughts | ||
internals | ||
lua-api | ||
acl.fig | ||
architecture.txt | ||
close-options.txt | ||
coding-style.txt | ||
configuration.txt | ||
cookie-options.txt | ||
gpl.txt | ||
haproxy-en.txt | ||
haproxy-fr.txt | ||
haproxy.1 | ||
lgpl.txt | ||
network-namespaces.txt | ||
proxy-protocol.txt | ||
queuing.fig |