Hi .

On 2023-10-16 (Mo.) 19:55, Ryan O'Hara wrote:
I wondered exactly the same thing, but then saw this on the haproxy.org website:

"version 1.8 : multi-threading, HTTP/2, cache, on-the fly server addition/removal, seamless reloads, DNS SRV, hardware SSL engines, ..."

I know that haproxy-1.9 added end-to-end HTTP/2, so is that the determining factor? here? Many thanks.

Oh you are right. The 1.8 was the first one with the mux_h2.c in the tree. This was the first version with some first steps into HTTP/2 world. From my point of view are the Statements from the HAProxy.com blog quite accurate why 1.8 is not affected with that CVE.

Ryan

Regards
Alex

On Mon, Oct 16, 2023 at 12:41 PM Aleksandar Lazic <al-hapr...@none.at <mailto:al-hapr...@none.at>> wrote:



    On 2023-10-16 (Mo.) 19:29, Илья Шипицин wrote:
     > Does 1.8 support http/2?

    No.

     > On Mon, Oct 16, 2023, 18:58 Ryan O'Hara <roh...@redhat.com
    <mailto:roh...@redhat.com>
     > <mailto:roh...@redhat.com <mailto:roh...@redhat.com>>> wrote:
     >
     >     Hi all.
     >
     >     I read the most recently HAProxy Newsletter, specifically the
     >     article "HAProxy is Not Affected by the HTTP/2 Rapid Reset
    Attack"
     >     by Nick Ramirez [1]. A This article states that HAProxy
    versions 1.9
     >     and later are *not* affetced, which is great. This implies that
     >     haproxy-1.8 *is* affected, but it also doesn't come right out and
     >     say that. I understand haproxy-1.8 is EOL, but do we know for
     >     certain that haproxy-1.8 is affected or not? Asking for a reason.
     >
     >     And shout-out to Nick for writing such a great article! Thank
    you, Nick!
     >
     >     Ryan
     >
     >     [1]
     >
    
https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
 
<https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487>
 
<https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
 
<https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487>>
     >


Reply via email to