![]() ![]() We've been notified of a vulnerability in HAProxy that can be exploited to build some request smuggling attacks. For more details, please have a look at the full article on HAProxyTech's blog and the more synthetic mailing-list announcement.įebruary, 14th, 2023 : CVE-2023-25725 fixed! At the most visible layers, QUIC is now considered production ready after having been running on this site for more than a year and with no glitch since 2.7 was released SSL got new improvements with a much better LetsEncrypt integration, wolfSSL support and OCSP automatic updates RFC7239 ("forwarded") is supported both in processing and generation listeners can now span multiple thread groups, setting a new limit of 4096 threads (let's hope we won't have to raise that one in the next two decades). Quick News May, 31th, 2023 : HAProxy 2.8.0 releaseĭuring the development cycle of this new LTS release, behind the curtains the focus was mostly set on all the stuff that can improve the reliability, observability and troubleshooting in field, in a quest to further reduce the number of problem reports. Site served using: HTTP version: Transport: Network: Note: HTTP 2 & 3 require HTTPS Your computer is not IPv6-ready ![]() TCP/HTTP Load Balancer HAProxy The Reliable, High Performance TCP/HTTP Load Balancer
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |