This bug impacts both QUIC backends and frontends with OpenSSL 3.5 as QUIC API. The connections to a haproxy QUIC listener from a haproxy QUIC backend could not work at all without HelloRetryRequest TLS messages emitted by the backend asking the QUIC client to restart the handshake followed by TLS alerts: conn. @(nil) OpenSSL error[0xa000098] read_state_machine: excessive message size Furthermore, the Initial CRYPTO data sent by the client were big (about two 1252 bytes packets) (ClientHello TLS message). After analyzing the packets a key_share extension with <unknown> as value was long (more that 1Ko). This extension is in relation with the groups but does not belong to the groups supported by QUIC. That said such connections could work with ngtcp2 as backend built against the same OSSL TLS stack API but with a HelloRetryRequest. ngtcp2 always set the QUIC default cipher suites and group, for all the stacks it supports as implemented by this patch. So this patch configures both QUIC backend and frontend cipher suites and groups calling SSL_CTX_set_ciphersuites() and SSL_CTX_set1_groups_list() with the correct argument, except for SSL_CTX_set1_groups_list() which fails with QUIC TLS for a unknown reason at this time. The call to SSL_CTX_set_options() is useless from ssl_quic_initial_ctx() for the QUIC clients. One relies on ssl_sock_prepare_srv_ssl_ctx() to set them for now on. This patch is effective for all the supported stacks without impact for AWS-LC, and QUIC TLS and fixes the connections for haproxy QUIC frontend and backends when builts against OpenSSL 3.5 QUIC API). A new define HAVE_OPENSSL_QUICTLS has been added to openssl-compat.h to distinguish the QUIC TLS stack. Must be backported to 3.2. |
||
---|---|---|
.github | ||
addons | ||
admin | ||
dev | ||
doc | ||
examples | ||
include | ||
reg-tests | ||
scripts | ||
src | ||
tests | ||
.cirrus.yml | ||
.gitattributes | ||
.gitignore | ||
.mailmap | ||
.travis.yml | ||
BRANCHES | ||
BSDmakefile | ||
CHANGELOG | ||
CONTRIBUTING | ||
INSTALL | ||
LICENSE | ||
MAINTAINERS | ||
Makefile | ||
README.md | ||
SUBVERS | ||
VERDATE | ||
VERSION |
HAProxy
HAProxy is a free, very fast and reliable reverse-proxy offering high availability, load balancing, and proxying for TCP and HTTP-based applications.
Installation
The INSTALL file describes how to build HAProxy. A list of packages is also available on the wiki.
Getting help
The discourse and the mailing-list are available for questions or configuration assistance. You can also use the slack or IRC channel. Please don't use the issue tracker for these.
The issue tracker is only for bug reports or feature requests.
Documentation
The HAProxy documentation has been split into a number of different files for ease of use. It is available in text format as well as HTML. The wiki is also meant to replace the old architecture guide.
Please refer to the following files depending on what you're looking for:
- INSTALL for instructions on how to build and install HAProxy
- BRANCHES to understand the project's life cycle and what version to use
- LICENSE for the project's license
- CONTRIBUTING for the process to follow to submit contributions
The more detailed documentation is located into the doc/ directory:
- doc/intro.txt for a quick introduction on HAProxy
- doc/configuration.txt for the configuration's reference manual
- doc/lua.txt for the Lua's reference manual
- doc/SPOE.txt for how to use the SPOE engine
- doc/network-namespaces.txt for how to use network namespaces under Linux
- doc/management.txt for the management guide
- doc/regression-testing.txt for how to use the regression testing suite
- doc/peers.txt for the peers protocol reference
- doc/coding-style.txt for how to adopt HAProxy's coding style
- doc/internals for developer-specific documentation (not all up to date)
License
HAProxy is licensed under GPL 2 or any later version, the headers under LGPL 2.1. See the LICENSE file for a more detailed explanation.