Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
BUG/MEDIUM: ssl: wrong priority whem limiting ECDSA ciphers in ECDSA+…
…RSA configuration The ClientHello Callback which is used for certificate selection uses both the signature algorithms and the ciphers sent by the client. However, when a client is announcing both ECDSA and RSA capabilities with ECSDA ciphers that are not available on haproxy side and RSA ciphers that are compatibles, the ECDSA certificate will still be used but this will result in a "no shared cipher" error, instead of a fallback on the RSA certificate. For example, a client could send 'ECDHE-ECDSA-AES128-CCM:ECDHE-RSA-AES256-SHA and HAProxy could be configured with only 'ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA'. This patch fixes the issue by validating that at least one ECDSA cipher is available on both side before chosing the ECDSA certificate. This must be backported on all stable versions.
- Loading branch information