diff options
author | PiBa-NL <pba_2k3@yahoo.com> | 2015-07-19 17:14:03 +0200 |
---|---|---|
committer | PiBa-NL <pba_2k3@yahoo.com> | 2015-07-19 17:14:03 +0200 |
commit | 6479eab976d425ae2f8d3eb988a4f79d701001a5 (patch) | |
tree | 430897f649275330f0e36ea4a349a99e92a7ad38 /config/haproxy1_5/www | |
parent | 06a66c936672073525ea2626b85ccc42db104f16 (diff) | |
download | pfsense-packages-6479eab976d425ae2f8d3eb988a4f79d701001a5.tar.gz pfsense-packages-6479eab976d425ae2f8d3eb988a4f79d701001a5.tar.bz2 pfsense-packages-6479eab976d425ae2f8d3eb988a4f79d701001a5.zip |
haproxy-1_5, haproxy-devel, bump binary versions to 1.5.14 / 1.6-dev2.
Also copy fixes made -devel to the -1_5 package.
Diffstat (limited to 'config/haproxy1_5/www')
-rw-r--r-- | config/haproxy1_5/www/haproxy_listeners_edit.php | 11 | ||||
-rw-r--r-- | config/haproxy1_5/www/haproxy_pool_edit.php | 2 |
2 files changed, 10 insertions, 3 deletions
diff --git a/config/haproxy1_5/www/haproxy_listeners_edit.php b/config/haproxy1_5/www/haproxy_listeners_edit.php index d8841c33..6998e099 100644 --- a/config/haproxy1_5/www/haproxy_listeners_edit.php +++ b/config/haproxy1_5/www/haproxy_listeners_edit.php @@ -71,7 +71,7 @@ uasort($a_pools, haproxy_compareByName); global $simplefields; $simplefields = array('name','desc','status','secondary','primary_frontend','type','forwardfor','httpclose','extaddr','backend_serverpool', 'max_connections','client_timeout','port','advanced_bind', - 'ssloffloadcert','dcertadv','ssloffload','ssloffloadacl','ssloffloadacladditional','sslclientcert-none','sslclientcert-invalid', + 'ssloffloadcert','dcertadv','ssloffload','ssloffloadacl','ssloffloadacladditional','sslclientcert-none','sslclientcert-invalid','sslocsp', 'socket-stats', 'dontlognull','dontlog-normal','log-separate-errors','log-detailed'); @@ -787,6 +787,12 @@ $primaryfrontends = get_haproxy_frontends($excludefrontend); <input id="ssloffloadacl" name="ssloffloadacl" type="checkbox" value="yes" <?php if ($pconfig['ssloffloadacl']=='yes') echo "checked";?> onclick="updatevisibility();" />Add ACL for certificate CommonName. (host header matches the 'CN' of the certificate)<br/> </td> </tr> + <tr class="haproxy_ssloffloading_enabled" align="left"> + <td width="22%" valign="top" class="vncell">OCSP</td> + <td width="78%" class="vtable" colspan="2"> + <input id="sslocsp" name="sslocsp" type="checkbox" value="yes" <?php if ($pconfig['sslocsp']=='yes') echo "checked";?> onclick="updatevisibility();" />Load certificate ocsp responses for easy certificate validation by the client.<br/> + </td> + </tr> <tr class="haproxy_ssloffloading_enabled"> <td width="22%" valign="top" class="vncell">Additional certificates</td> <td width="78%" class="vtable" colspan="2" valign="top"> @@ -805,7 +811,8 @@ $primaryfrontends = get_haproxy_frontends($excludefrontend); <input type='text' name='dcertadv' size="64" id='dcertadv' <?if(isset($pconfig['dcertadv'])) echo 'value="'.htmlspecialchars($pconfig['dcertadv']).'"';?> /> <br/> NOTE: Paste additional ssl options(without commas) to include on ssl listening options.<br/> - some options: force-sslv3, force-tlsv10 force-tlsv11 force-tlsv12 no-sslv3 no-tlsv10 no-tlsv11 no-tlsv12 no-tls-tickets + some options: force-sslv3, force-tlsv10 force-tlsv11 force-tlsv12 no-sslv3 no-tlsv10 no-tlsv11 no-tlsv12 no-tls-tickets<br/> + Example: no-sslv3 ciphers EECDH+aRSA+AES:TLSv1+kRSA+AES:TLSv1+kRSA+3DES </td> </tr> <tr class="haproxy_ssloffloading_enabled haproxy_primary"> diff --git a/config/haproxy1_5/www/haproxy_pool_edit.php b/config/haproxy1_5/www/haproxy_pool_edit.php index 5e38b12d..0824e45c 100644 --- a/config/haproxy1_5/www/haproxy_pool_edit.php +++ b/config/haproxy1_5/www/haproxy_pool_edit.php @@ -961,7 +961,7 @@ set by the 'retries' parameter.</div> <td colspan="2" valign="top" class="listtopic">Advanced</td> </tr> <tr class="" align="left" id='Strict-Transport-Security'> - <td width="22%" valign="top" class="vncell">Strict-Transport-Security</td> + <td width="22%" valign="top" class="vncell">HSTS Strict-Transport-Security</td> <td width="78%" class="vtable" colspan="2"> When configured enables "HTTP Strict Transport Security" leave empty to disable. (only used on 'http' frontends)<br/> <b>WARNING! the domain will only work over https with a valid certificate!</b><br/> |