Displaying 9 results from an estimated 9 matches for "tcplog".
2013 Feb 01
3
Cannot get puppetlabs-haproxy to do what I want
...39;'haproxy'': }
haproxy::listen { ''messaging00'':
options => {
''mode'' => ''tcp'',
''balance'' => ''roundrobin'',
''option'' => [
''tcplog'',
''tcpka''
]
},
ipaddress => $::ipaddress,
ports => [''55672'',''5672''],
}
haproxy::listen { ''private_monitoring01'':
options => {
''mode'' => ...
2015 Oct 13
1
Dovecot - Postfix with HAproxy
...2.2.19 pour proxy protocol)
haproxy : 1.5.14
postfix : 2.11.2-1 (>2.10 pour postscreen)
A part of my configuration :
##HAPROXY
#postfix
listen smtp
bind mail.xx.xx:465
balance roundrobin
timeout client 1m
timeout connect 5s
no option http-server-close
mode tcp
option smtpchk
option tcplog
server tst tst.xxx:10465 send-proxy
server tst2 tst2.xxx:10465 send-proxy
server tst3 tst3.xxx:10465 send-proxy
#dovecot
listen imap
bind mail.xxx.xx:993
timeout client 1m
no option http-server-close
balance leastconn
stick store-request src
stick-table type ip size 200k expire 30m
mode tcp
option...
2020 Jan 13
2
Adding SNI support to SSH
...can even forward the original client IP to
the end host using the "proxy protocol".
pps: The whole haproxy configuration for it looks as following. It
supports smtps, imaps. https and http at the moment.
# ipv4 https frontend
frontend httpsipv4
bind ipv4@:443
mode tcp
option tcplog
tcp-request inspect-delay 5s
tcp-request content accept if { req_ssl_hello_type 1 }
default_backend httpsipv4
backend httpsipv4
mode tcp
use-server webmail.ungleich.ch if { req_ssl_sni -i webmail.ungleich.ch }
server webmail.ungleich.ch ipv6 at webmail.ungleich.ch
......
1998 May 08
4
Lightning fast attacks?
RH4.2 Linux Intel
Last night I got three of these log messages: Two in a row, one a bit later.
May 8 00:35:15 osg-gw imapd[4307]: warning: can''t get client address:
Connectio
n reset by peer
May 8 00:35:15 osg-gw imapd[4307]: refused connect from unknown
Now, I have imapd blocked to non-local users using tcpd wrappers, so
tcpd is trying to find the address of the remote machine (all
2015 Aug 20
2
PROXY protocol
On 19/8/2015 5:43 ??, Stephan Bosch wrote:
> Well...
>
> http://hg.dovecot.org/dovecot-2.2/rev/4d7a83ddb644
>
> Regards,
>
> Stephan.
That was impressive!
Thank you Timo and Stephan. You are superb!
I hope you will be able to provide some basic guidelines on how to
enable/use the new functionality. (I am not very code-literate.)
Looking forward to it!
Thanks again!
2015 Aug 20
0
PROXY protocol
...4, 10.2.1.0/24
# This is the timeout... in seconds.
# default, 3
# haproxy_timeout = 3
# modify your inet listener's to include haproxy=yes
inet_listener {
haproxy = yes
}
As for HAProxy, the configuration would look something like this:
listen smtp :25
mode tcp
option tcplog
option smtpchk
balance roundrobin
server smtp1 ip.of.server1:25 check-send-proxy check inter 10s send-proxy
server smtp2 ip.of.server2:25 check-send-proxy check inter 10s send-proxy
Regards,
Tim
2015 Oct 15
1
Haproxy and Dovecot auth
...: Connection lost to authentication server
If then I send more emails I receive no errors.
If I do not send emails for a few minutes, the error appears again.
The relevant Haproxy configuration is the following:
listen auth *:12345
mode tcp
balance source
log global
option tcplog
option log-health-checks
stick-table type ip size 200k expire 30m
stick on src
default-server inter 1000 fall 3 rise 1
server dovecot-director01 dovecot-director01:12345 check
Do anyone have an idea about what it's missing?
Thanks a lot
Giuseppe
--
Giuseppe Civ...
2015 Mar 27
5
postfix sasl -> haproxy -> dovecot auth
...t:127.0.0.1:20025
smtpd_sasl_security_options = noanonymous
smtpd_sasl_tls_security_options = $smtpd_sasl_security_options
smtpd_sasl_type = dovecot
# HAPROX
frontend postfix-sasl
bind 127.0.0.1:20025
default_backend dovecot-auth
backend dovecot-auth
mode tcp
option tcplog
option srvtcpka
hash-type consistent
balance roundrobin
server mail-backend-1 31.220.19.52:20025 check
server mail-backend-2 31.220.19.53:20025 check
2020 Jan 13
4
Adding SNI support to SSH
Christian Weisgerber <naddy at mips.inka.de> writes:
> On 2020-01-12, Dustin Lundquist <dustin at null-ptr.net> wrote:
>
>> I think the intended application is to proxy through a proxy host provided by the service provider. If SSH had a SNI like feature where a host identifier was passed in plain text during the initial connection. This way the user would just need to