|
2 | 2 | <html lang="en"> |
3 | 3 | <head> |
4 | 4 | <meta charset="utf-8" /> |
5 | | - <title>HAProxy version 3.2.7-9 - Configuration Manual</title> |
| 5 | + <title>HAProxy version 3.2.7-22 - Configuration Manual</title> |
6 | 6 | <link href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" /> |
7 | 7 | <link href="https://raw.githubusercontent.com/thomaspark/bootswatch/v3.3.7/cerulean/bootstrap.min.css" rel="stylesheet" /> |
8 | 8 | <link href="../css/page.css?0.4.2-15" rel="stylesheet" /> |
|
3884 | 3884 |
|
3885 | 3885 | <a class="list-group-item" href="#ssl_fc_early_exporter_secret">ssl_fc_early_exporter_secret</a> |
3886 | 3886 |
|
| 3887 | + <a class="list-group-item" href="#ssl_fc_early_rcvd">ssl_fc_early_rcvd</a> |
| 3888 | + |
3887 | 3889 | <a class="list-group-item" href="#ssl_fc_ecformats_bin">ssl_fc_ecformats_bin</a> |
3888 | 3890 |
|
3889 | 3891 | <a class="list-group-item" href="#ssl_fc_eclist_bin">ssl_fc_eclist_bin</a> |
|
4620 | 4622 | You can use <strong>left</strong> and <strong>right</strong> arrow keys to navigate between chapters.<br> |
4621 | 4623 | </p> |
4622 | 4624 | <p class="text-right"> |
4623 | | - <small>Converted with <a href="https://github.com/cbonte/haproxy-dconv">haproxy-dconv</a> v<b>0.4.2-15</b> on <b>2025/10/27</b></small> |
| 4625 | + <small>Converted with <a href="https://github.com/cbonte/haproxy-dconv">haproxy-dconv</a> v<b>0.4.2-15</b> on <b>2025/11/05</b></small> |
4624 | 4626 | </p> |
4625 | 4627 | </div> |
4626 | 4628 | <!-- /.sidebar --> |
|
4631 | 4633 | <div class="text-center"> |
4632 | 4634 | <h1><a href="http://www.haproxy.org/" title="HAProxy"><img src="../img/HAProxyCommunityEdition_60px.png?0.4.2-15" /></a></h1> |
4633 | 4635 | <h2>Configuration Manual</h2> |
4634 | | - <p><strong>version 3.2.7-9</strong></p> |
| 4636 | + <p><strong>version 3.2.7-22</strong></p> |
4635 | 4637 | <p> |
4636 | 4638 | 2025/10/23<br> |
4637 | 4639 |
|
@@ -27750,6 +27752,13 @@ <h3 id="chapter-7.3.4" data-target="7.3.4"><small><a class="small" href="#7.3.4" |
27750 | 27752 | </pre><a class="anchor" name="ssl_fc_curve"></a><a class="anchor" name="7-ssl_fc_curve"></a><a class="anchor" name="7.3.4-ssl_fc_curve"></a><a class="anchor" name="ssl_fc_curve (Using ACLs and fetching samples)"></a><a class="anchor" name="ssl_fc_curve (Fetching samples at Layer 5)"></a><div class="keyword"><b><a class="anchor" name="ssl_fc_curve"></a><a href="#7.3.4-ssl_fc_curve">ssl_fc_curve</a></b> : string</div><pre class="text">Returns the name of the curve used in the key agreement when the incoming |
27751 | 27753 | connection was made over an SSL/TLS transport layer. This requires |
27752 | 27754 | OpenSSL >= 3.0.0. |
| 27755 | +</pre><a class="anchor" name="ssl_fc_early_rcvd"></a><a class="anchor" name="7-ssl_fc_early_rcvd"></a><a class="anchor" name="7.3.4-ssl_fc_early_rcvd"></a><a class="anchor" name="ssl_fc_early_rcvd (Using ACLs and fetching samples)"></a><a class="anchor" name="ssl_fc_early_rcvd (Fetching samples at Layer 5)"></a><div class="keyword"><b><a class="anchor" name="ssl_fc_early_rcvd"></a><a href="#7.3.4-ssl_fc_early_rcvd">ssl_fc_early_rcvd</a></b> : boolean</div><pre class="text">Returns true if early data were seen over that connection, regardless of the |
| 27756 | +fact that the handshake has since completed. It has no practical use case for |
| 27757 | +traffic processing, however it's about the only way to "see" that a client |
| 27758 | +used 0-RTT to send early data, and is sometimes useful when debugging, since |
| 27759 | +the only other alternatives are network traffic captures or logging the front |
| 27760 | +connection's flags and matching them in the code. It may also be useful to |
| 27761 | +get statistics on clients' capabilities. See also "<a href="#ssl_fc_has_early">ssl_fc_has_early</a>". |
27753 | 27762 | </pre><a class="anchor" name="ssl_fc_early_exporter_secret"></a><a class="anchor" name="7-ssl_fc_early_exporter_secret"></a><a class="anchor" name="7.3.4-ssl_fc_early_exporter_secret"></a><a class="anchor" name="ssl_fc_early_exporter_secret (Using ACLs and fetching samples)"></a><a class="anchor" name="ssl_fc_early_exporter_secret (Fetching samples at Layer 5)"></a><div class="keyword"><b><a class="anchor" name="ssl_fc_early_exporter_secret"></a><a href="#7.3.4-ssl_fc_early_exporter_secret">ssl_fc_early_exporter_secret</a></b> : string</div><pre class="text">Return the EARLY_EXPORTER_SECRET as an hexadecimal string for the |
27754 | 27763 | front connection when the incoming connection was made over an TLS 1.3 |
27755 | 27764 | transport layer. |
@@ -27842,9 +27851,10 @@ <h3 id="chapter-7.3.4" data-target="7.3.4"><small><a class="small" href="#7.3.4" |
27842 | 27851 | certificate is not present in the current connection but may be retrieved |
27843 | 27852 | from the cache or the ticket. So prefer "<a href="#ssl_c_used">ssl_c_used</a>" if you want to check if |
27844 | 27853 | current SSL session uses a client certificate. |
27845 | | -</pre><a class="anchor" name="ssl_fc_has_early"></a><a class="anchor" name="7-ssl_fc_has_early"></a><a class="anchor" name="7.3.4-ssl_fc_has_early"></a><a class="anchor" name="ssl_fc_has_early (Using ACLs and fetching samples)"></a><a class="anchor" name="ssl_fc_has_early (Fetching samples at Layer 5)"></a><div class="keyword"><b><a class="anchor" name="ssl_fc_has_early"></a><a href="#7.3.4-ssl_fc_has_early">ssl_fc_has_early</a></b> : boolean</div><pre class="text">Returns true if early data were sent, and the handshake didn't happen yet. As |
27846 | | -it has security implications, it is useful to be able to refuse those, or |
27847 | | -wait until the handshake happened. |
| 27854 | +</pre><a class="anchor" name="ssl_fc_has_early"></a><a class="anchor" name="7-ssl_fc_has_early"></a><a class="anchor" name="7.3.4-ssl_fc_has_early"></a><a class="anchor" name="ssl_fc_has_early (Using ACLs and fetching samples)"></a><a class="anchor" name="ssl_fc_has_early (Fetching samples at Layer 5)"></a><div class="keyword"><b><a class="anchor" name="ssl_fc_has_early"></a><a href="#7.3.4-ssl_fc_has_early">ssl_fc_has_early</a></b> : boolean</div><pre class="text">Returns true if early data were sent, and the handshake didn't complete yet. |
| 27855 | +As it has security implications, it is useful to be able to refuse those, or |
| 27856 | +wait until the handshake completes (via the "<a href="#wait-for-handshake">wait-for-handshake</a>" action). See |
| 27857 | +also "<a href="#ssl_fc_early_rcvd">ssl_fc_early_rcvd</a>". |
27848 | 27858 | </pre><a class="anchor" name="ssl_fc_has_sni"></a><a class="anchor" name="7-ssl_fc_has_sni"></a><a class="anchor" name="7.3.4-ssl_fc_has_sni"></a><a class="anchor" name="ssl_fc_has_sni (Using ACLs and fetching samples)"></a><a class="anchor" name="ssl_fc_has_sni (Fetching samples at Layer 5)"></a><div class="keyword"><b><a class="anchor" name="ssl_fc_has_sni"></a><a href="#7.3.4-ssl_fc_has_sni">ssl_fc_has_sni</a></b> : boolean</div><pre class="text">This checks for the presence of a Server Name Indication TLS extension (SNI) |
27849 | 27859 | in an incoming connection was made over an SSL/TLS transport layer. Returns |
27850 | 27860 | true when the incoming connection presents a TLS SNI field. This requires |
@@ -33169,7 +33179,7 @@ <h2 id="chapter-12.9" data-target="12.9"><small><a class="small" href="#12.9">12 |
33169 | 33179 | <br> |
33170 | 33180 | <hr> |
33171 | 33181 | <div class="text-right"> |
33172 | | - HAProxy 3.2.7-9 – Configuration Manual<br> |
| 33182 | + HAProxy 3.2.7-22 – Configuration Manual<br> |
33173 | 33183 | <small>, 2025/10/23</small> |
33174 | 33184 | </div> |
33175 | 33185 | </div> |
|
0 commit comments