> Em 20 de fev de 2019, à(s) 03:30, Baptiste <[email protected]> escreveu:
> 
> Hi Joao,
> 
> I do have a question for you about your ingress controller design and the 
> "chained" frontends, summarized below:
> * The first frontend is on tcp mode binding :443, inspecting sni and doing a 
> triage;
>    There is also a ssl-passthrough config - from the triage frontend straight 
> to a tcp backend.
> * The second frontend is binding a unix socket with ca-file (tls 
> authentication);
> * The last frontend is binding another unix socket, doing ssl-offload but 
> without ca-file.
> 
> What feature is missing in HAProxy to allow switching these 3 frontends into 
> a single one?
> I understand that the ability to do ssl deciphering and ssl passthrough on a 
> single bind line is one of them. Is there anything else we could improve?
> I wonder if crt-list would be useful in your case: 
> https://cbonte.github.io/haproxy-dconv/1.9/configuration.html#5.1-crt-list
> 
Hi Baptiste, I’m changing the approach of the frontend creation - if the user 
configuration just need one, this one will listen :443 without need to chain 
another one. Regarding switch to more frontends - or at least more bind lines 
in the same frontend - and creating the mode-tcp one, here are the current 
rules:

* conflict on timeout client - and perhaps on other frontend configs - distinct 
frontends will be created to each one
* if one really want to use a certificate that doesn’t match its domain - 
crt-list sounds to solve this
* tls auth (bind with ca-file) and no tls auth - I don’t want to mix then in 
the same frontend because of security - tls auth use sni, no tls auth use host 
header
* ssl-passthrough as you have mentioned

~jm


Reply via email to