HA Proxy supports optional ssl configuration and sni filters per certificate so you can for example have client required verification on certain SSL hosts only. The documentation is at https://cbonte.github.io/haproxy-dconv/1.8/configuration.html#5.1-crt-list
A sample crt-list.txt file I have created to test this looks like:
/certs/nginx-test-2.example.com.pem [ca-file /certs/tmp/ca.crt verify required]
/certs/nginx-test-1.example.com.pem
As expected, test-1 can be accessed freely by anyone; test-2 requires valid client certificates to be present for the service to be hit.
At the moment I see the SSL certificate list is created by adding any files from /certs. Given the above configuration can get quite complex, I propose the addition of the option DF_CRT_LIST_PATH to DFP. When set, DFP will no longer try and create the crt-list.txt file and will instead rely on outside sources to correctly create that file.
This is just one possible solution. I'd love the ability to achieve per certificate sslbind options and if anyone has a better or more convenient solution I'd be happy to go with that.
I'm aware there are a few other places that SSL certificates are read/used in DFP but I confess I am not fully aware of the feature set those instances provide. The above proposal does not really consider how to handle certificate addition or removal from the crt-list. I'd assume that whatever system creates the crt-list would also need to trigger a reload ?
What are peoples thoughts ? Does this seem like a feature we could viably add to DFP?
HA Proxy supports optional ssl configuration and sni filters per certificate so you can for example have client required verification on certain SSL hosts only. The documentation is at https://cbonte.github.io/haproxy-dconv/1.8/configuration.html#5.1-crt-list
A sample crt-list.txt file I have created to test this looks like:
As expected, test-1 can be accessed freely by anyone; test-2 requires valid client certificates to be present for the service to be hit.
At the moment I see the SSL certificate list is created by adding any files from /certs. Given the above configuration can get quite complex, I propose the addition of the option
DF_CRT_LIST_PATHto DFP. When set, DFP will no longer try and create the crt-list.txt file and will instead rely on outside sources to correctly create that file.This is just one possible solution. I'd love the ability to achieve per certificate sslbind options and if anyone has a better or more convenient solution I'd be happy to go with that.
I'm aware there are a few other places that SSL certificates are read/used in DFP but I confess I am not fully aware of the feature set those instances provide. The above proposal does not really consider how to handle certificate addition or removal from the crt-list. I'd assume that whatever system creates the crt-list would also need to trigger a reload ?
What are peoples thoughts ? Does this seem like a feature we could viably add to DFP?