Re: Long Running TCP Connections and Reloads

2017-09-15 Thread Pean, David S.
MEDIUM: stream: fix client-fin/server-fin handling A tcp half connection can cause 100% CPU on expiration. On Thu, Sep 14, 2017 at 6:59 PM, Pean, David S. mailto:david.s.p...@espn.com>> wrote: Hello! I am using a TCP front-end that potentially keeps connections open for several hou

Long Running TCP Connections and Reloads

2017-09-14 Thread Pean, David S.
Hello! I am using a TCP front-end that potentially keeps connections open for several hours, while also frequently issuing reloads due to an id to server mapping that is changing constantly. This causes many processes to be running at any given time, which generally works as expected. However,

Re: "[PATCH] Feature: Implement and extentd PROXY Protocol V2"

2014-05-08 Thread David S
On Thu, May 8, 2014 at 6:01 PM, Willy Tarreau wrote: > Hi David, > > (.) > > OK. > > I'd like to issue dev25 this week-end since we fixed a number of nasty > issues. Do you think you can make the adjustments by then ? I'd really > like to merge your work so that you have something to play w

"[PATCH] Feature: Implement and extentd PROXY Protocol V2"

2014-05-08 Thread David S
Please find attached a patch that fully implements PROXY Protocol V2, and adds initial extensions to include some SSL information. I have updated the configuration.txt and proxy-protocol.txt files. The patch should apply to the latest code in git. I believe I have incorporated all suggestions fr

[PATCH] Extending Proxy Protocol

2014-05-02 Thread David S
Hi Willy-- Here's my latest on extending Proxy Protocol V2. I'm still testing this, but I would like to solicit any feedback that you may have. I believe I have incorporated all of your comments to date. So far, I have implemented CN as a first sub-vector. I'm willing to write a couple

Re: [PATCH] FEATURE Implementing send-proxy version 2

2014-04-29 Thread David S
On Wed, Apr 23, 2014 at 4:24 PM, Willy Tarreau wrote: > On Wed, Apr 23, 2014 at 04:19:17PM -0400, David S wrote: > > On Wed, Apr 23, 2014 at 5:45 AM, Willy Tarreau wrote: > > > > > (...) > > > Otherwise your patch looks fine. Do you want me to merge it ? If so,

Re: [PATCH] FEATURE Implementing send-proxy version 2

2014-04-23 Thread David S
On Wed, Apr 23, 2014 at 5:45 AM, Willy Tarreau wrote: > (...) > Otherwise your patch looks fine. Do you want me to merge it ? If so, > please could you provide a commit message with it ? > > Thanks, > Willy > First, I'll update the documentation to keep it in sync with the code. Thinking ahead

Re: [PATCH] FEATURE Implementing send-proxy version 2

2014-04-22 Thread David S
> > (...) > Yes sure, for this there's a "target" pointer in the connection, it > points to an enum obj_type* which lets us check what the target is. > > So basically to get a server pointer, you just need to use this : > > srv = objt_server(conn->target); > > If the target is not a server, srv w

Re: [PATCH] FEATURE Implementing send-proxy version 2

2014-04-22 Thread David S
> > (...) > > /* returns true is the transport layer is ready */ > > static inline int conn_xprt_ready(const struct connection *conn) > > diff --git a/include/types/connection.h b/include/types/connection.h > > index 5341a86..b3b85ab 100644 > > --- a/include/types/connection.h > > +++ b/include/t

[PATCH] FEATURE Implementing send-proxy version 2

2014-04-21 Thread David S
As a foundation for extending the proxy-protocol to include additional information, I've implemented version 2 of the proxy protocol. As we discussed in the "Extending PROXY protocol for SSL" thread, I made one change to the protocol. Version and Command are combined into one byte. Length is now

Re: [PATCH] FEATURE Extending PROXY protocol for SSL

2014-04-17 Thread David S
On Wed, Apr 16, 2014 at 5:44 PM, Willy Tarreau wrote: > (...) > We can also decide that we don't implement the extensions in v1 which > will motivate adoption for the new v2. > (...) > > What's your opinion ? > > Willy > > I prefer to make the extension v2 only, mostly because I don't want to wri

Re: [PATCH] FEATURE Extending PROXY protocol for SSL

2014-04-16 Thread David S
On Tue, Apr 15, 2014 at 6:13 AM, Willy Tarreau wrote: > Hi David, > > On Mon, Apr 14, 2014 at 09:54:19PM -0400, David S wrote: > > Hello-- > > Part of my solution uses a non-HTTP protocol. My backend server need > > L3/L4 information, so the PROXY protocol is

[PATCH] FEATURE Extending PROXY protocol for SSL

2014-04-14 Thread David S
Hello-- Part of my solution uses a non-HTTP protocol. My backend server need L3/L4 information, so the PROXY protocol is a perfect fit. In addition to TCP and IP addresses, my backend server needs information from the client SSL connection. So, I would like to extend the PROXY protocol.

Re: [PATCH] Fetching TLS Unique ID

2014-04-09 Thread David S
Sorry, I missed that when rebasing. I'm not sure how. SMP_T_CSTR needs to be changed to SMP_T_STR On Wed, Apr 9, 2014 at 8:45 AM, Lukas Tribus wrote: > Hi Willy, hi David, > > > > On Tue, Apr 08, 2014 at 06:48:47PM -0400, David S wrote: > >> Thank you Lukas. &

Re: [PATCH] Fetching TLS Unique ID

2014-04-08 Thread David S
Thank you Lukas. Here is the rebased patch. I also made one correction, I had added ssl_fc_unique_id as an ACL keyword, but that does not make sense. I removed that added line from my patch. Answering a question I received offline: base64 is the common way to encode this value. SCRAM (RFC 5802),

[PATCH] Fetching TLS Unique ID

2014-04-08 Thread David S
Hello-- The TLS unique id, or unique channel binding, is a byte string that can be pulled from a TLS connection and it is unique to that connection. It is defined in RFC 5929 section 3. The value is used by various upper layer protocols as part of an extra layer of security. For example XMPP

Re: Extending Proxy Protocol

2014-03-13 Thread David S
the client certificate. The maximum length of a CN is 64 bytes. Please let me know your thoughts and what procedure I should follow to submit my patch. Thanks, David On Thu, Jan 30, 2014 at 3:10 AM, Willy Tarreau wrote: > Hi David, > > On Wed, Jan 29, 2014 at 10:53:22PM -0500, David S wrote

Extending Proxy Protocol

2014-01-29 Thread David S
I want to use HAProxy to terminate my incoming SSL connections and forward the messages to my server application. My challenge is that my application needs information from the client certificates. The Proxy Protocol is one way that connection information can be forwarded from HAProxy to the rec