Re: Wierd issue with OCSP updating

2023-07-10 Thread Shawn Heisey
On 7/8/23 21:33, Shawn Heisey wrote: Here's the very weird part.  It seems that haproxy is sending the OCSP request to localhost, not the http://r3.o.lencr.org URL that it SHOULD be sending it to.  Right before the above log entry is this one: Jul  8 21:15:38 - haproxy[4075] 127.0.0.1:57696

Re: Wierd issue with OCSP updating

2023-07-10 Thread Shawn Heisey
On 7/8/23 21:33, Shawn Heisey wrote: Here's the very weird part.  It seems that haproxy is sending the OCSP request to localhost, not the http://r3.o.lencr.org URL that it SHOULD be sending it to.  Right before the above log entry is this one: Jul  8 21:15:38 - haproxy[4075] 127.0.0.1:57696

[PR] Allow load of non-existing pattern files.

2023-07-10 Thread PR Bot
Dear list! Author: Daan van Gorkum Number of patches: 1 This is an automated relay of the Github pull request: Allow load of non-existing pattern files. Patch title(s): Allow load of non-existing pattern files. Link: https://github.com/haproxy/haproxy/pull/2209 Edit locally:

Re: OCSP update mechanism startup

2023-07-10 Thread Remi Tricot-Le Breton
On 07/07/2023 18:24, Willy Tarreau wrote: On Fri, Jul 07, 2023 at 03:42:58PM +, Tristan wrote: Also personally I have never understood the point of default server certs... besides getting unwanted attention from censys/shodan/etc... I remember some users who were hosting many