Hi Julien,

> SSLdump taken from the server:

Mmh, there is not much to read from this. Could the tcpdump the failed
handshake (remember to use -s 0 to avoid truncating the packets) and
provide the pcap file?


> Is anybody using ECDHE with haproxy from git at
> 506d050600ffa767345766bdc19752284c971a9f ?

It does work for me (ECDHE-RSA-AES256-SHA works, ECDHE-RSA-AES256-GCM-SHA384
results in "no ciphers available", but thats a different issue - its probably
disabled somewhere):

> lukas@ubuntuvm:~/haproxy$ ./haproxy -vv
> HA-Proxy version 1.5-dev19-12 2013/07/06
> [...]
>   OPTIONS = USE_ZLIB=1 USE_OPENSSL=1 USE_STATIC_PCRE=1 USE_PCRE_JIT=1 
> USE_TFO=1
> [...]
> Built with OpenSSL version : OpenSSL 1.0.1e 11 Feb 2013
> Running on OpenSSL version : OpenSSL 1.0.1e 11 Feb 2013
> [...]
> lukas@ubuntuvm:~/haproxy$ openssl s_client -connect 10.0.0.55:443 -cipher 
> ECDHE-RSA-AES256-GCM-SHA384
> CONNECTED(00000003)
> 3074357448:error:140740B5:SSL routines:SSL23_CLIENT_HELLO:no ciphers 
> available:s23_clnt.c:469:
> [...]
> lukas@ubuntuvm:~/haproxy$ openssl s_client -connect 10.0.0.55:443 -cipher 
> ECDHE-RSA-AES256-SHA
> CONNECTED(00000003)
> [...]
> New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
> Server public key is 2048 bit
> Secure Renegotiation IS supported
> [...]




> I suspect the issue lies somewhere in the static build of openssl, but
> since I followed the doc and didn't add anything funky, I'm not sure
> what to look at next...

First thing I would do is to try OpenSSL stable, really. Even if the client
correctly works with ECDHE, it doesn't mean it fully works in all conditions.


Regards,

Lukas                                     

Reply via email to