Shawn Heisey
2014-09-09 21:47:30 UTC
I do not think this is a problem with haproxy (running 1.5.4), but I'm
hoping haproxy can help me debug it.
When I get SSL handshake failure, can haproxy be configured to log debug
messages about WHY it failed? We don't have any visibility into the
client -- it's at a customer site in Japan, I'm in the US.
There is another question, but it's on an unrelated product. I've got
the latest version of Wireshark (1.12.0), configured with my
certificate's private key for SSL decrypting. The problem is that
Wireshark is telling me that there is something wrong with the TLSv1
frames ("Ignored Unknown Record"). I do not have decrypted responses,
only decrypted requests, and I assume that is because of those TLSv1
problems. The question: Is wireshark buggy, or are those TLSv1 frames
actually problematic? The program was compiled against
openssl-0.9.8e-27.el5_10.1 and it's running on a system with
openssl-0.9.8e-7.el5 installed -- the production systems don't have a
compiler or dev libraries installed, and when I attempted to install
them, yum wouldn't work.
If I force haproxy to use sslv3, then wireshark can decrypt the packets
properly (when checked with a browser), but then our testing tools can't
connect to it.
Thanks,
Shawn
hoping haproxy can help me debug it.
When I get SSL handshake failure, can haproxy be configured to log debug
messages about WHY it failed? We don't have any visibility into the
client -- it's at a customer site in Japan, I'm in the US.
There is another question, but it's on an unrelated product. I've got
the latest version of Wireshark (1.12.0), configured with my
certificate's private key for SSL decrypting. The problem is that
Wireshark is telling me that there is something wrong with the TLSv1
frames ("Ignored Unknown Record"). I do not have decrypted responses,
only decrypted requests, and I assume that is because of those TLSv1
problems. The question: Is wireshark buggy, or are those TLSv1 frames
actually problematic? The program was compiled against
openssl-0.9.8e-27.el5_10.1 and it's running on a system with
openssl-0.9.8e-7.el5 installed -- the production systems don't have a
compiler or dev libraries installed, and when I attempted to install
them, yum wouldn't work.
If I force haproxy to use sslv3, then wireshark can decrypt the packets
properly (when checked with a browser), but then our testing tools can't
connect to it.
Thanks,
Shawn