File: test-inspect-ssl.cfg

package info (click to toggle)
haproxy 1.7.5-2
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 8,364 kB
  • ctags: 8,494
  • sloc: ansic: 92,976; xml: 1,754; sh: 1,227; python: 1,005; makefile: 831; perl: 550
file content (37 lines) | stat: -rw-r--r-- 1,211 bytes parent folder | download | duplicates (17)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
# This is a test configuration. It listens on port 8443, waits for an incoming
# connection, and applies the following rules :
#   - if the address is in the white list, then accept it and forward the
#     connection to the server (local port 443)
#   - if the address is in the black list, then immediately drop it
#   - otherwise, wait up to 3 seconds for valid SSL data to come in. If those
#     data are identified as SSL, the connection is immediately accepted, and
#     if they are definitely identified as non-SSL, the connection is rejected,
#     which will happen upon timeout if they still don't match SSL.

listen block-non-ssl
	log 127.0.0.1:514 local0
	option tcplog

	mode tcp
	bind :8443
	timeout  client 6s
	timeout  server 6s
	timeout connect 6s

	tcp-request inspect-delay 4s

	acl white_list src 127.0.0.2
	acl black_list src 127.0.0.3

	# note: SSLv2 is not used anymore, SSLv3.1 is TLSv1.
	acl obsolete_ssl  req_ssl_ver   lt 3
	acl correct_ssl   req_ssl_ver   3.0-3.1
	acl invalid_ssl   req_ssl_ver   gt 3.1

	tcp-request content accept if white_list
	tcp-request content reject if black_list
	tcp-request content reject if !correct_ssl

	balance roundrobin
	server srv1 127.0.0.1:443