- Creates new userlist with name <listname>. Many independent userlists can be
- used to store authentication & authorization data for independent customers.
- Adds user <username> to the current userlist. Both secure (encrypted) and
- insecure (unencrypted) passwords can be used. Encrypted passwords are
- evaluated using the crypt(3) function, so depending on the system's
- based Linux systems support MD5, SHA-256, SHA-512, and, of course, the
- classic DES-based method of encrypting passwords.
-
- Attention: Be aware that using encrypted passwords might cause significantly
- increased CPU usage, depending on the number of requests, and the algorithm
- be processed through the chosen algorithm, before it can be compared to the
- value specified in the config file. Most current algorithms are deliberately
- designed to be expensive to compute to achieve resistance against brute
- force attacks. They do not simply salt/hash the clear text password once,
- but thousands of times. This can quickly become a major factor in haproxy's
- Please note that both lists are functionally identical.