3 log /dev/log local1 notice
4 chroot /var/lib/haproxy
5 stats socket /run/haproxy/admin.sock mode 660 level admin
6 stats socket /run/haproxy/user.sock mode 660 level user group munin
13 # Default SSL material locations
14 ca-base /etc/ssl/certs
15 crt-base /etc/ssl/private
17 # Default ciphers to use on SSL-enabled listening sockets.
18 # For more information, see ciphers(1SSL). This list is from:
19 # https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
20 ssl-default-bind-ciphers ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
21 ssl-default-bind-options no-sslv3
34 errorfile 400 /etc/haproxy/errors/400.http
35 errorfile 403 /etc/haproxy/errors/403.http
36 errorfile 408 /etc/haproxy/errors/408.http
37 errorfile 500 /etc/haproxy/errors/500.http
38 errorfile 502 /etc/haproxy/errors/502.http
39 errorfile 503 /etc/haproxy/errors/503.http
40 errorfile 504 /etc/haproxy/errors/504.http
45 # redirect scheme https code 301 if !{ ssl_fc }
48 bind :::443 v4v6 tfo ssl crt /etc/ssl/private/snapshot.debian.org.key-certchain
50 default_backend backend
52 option http-keep-alive
53 # We rate-limit requests by clients.
54 # Currently, we do that at the netfilter level, so one
55 # request per connection works best.
62 option http-keep-alive
64 timeout http-keep-alive 15s
66 server varnish 127.0.0.1:6081
68 http-response set-header Strict-Transport-Security "max-age=15768000; preload"
69 #http-response del-header Server