Blame SOURCES/httpd-2.4.6-r1684462.patch
|
|
008793 |
--- a/modules/ssl/ssl_engine_kernel.c 2015/06/09 15:55:41 1684461
|
|
|
008793 |
+++ b/modules/ssl/ssl_engine_kernel.c 2015/06/09 16:09:28 1684462
|
|
|
008793 |
@@ -1940,7 +1940,7 @@
|
|
|
008793 |
#ifndef OPENSSL_NO_TLSEXT
|
|
|
008793 |
/*
|
|
|
008793 |
* This callback function is executed when OpenSSL encounters an extended
|
|
|
008793 |
- * client hello with a server name indication extension ("SNI", cf. RFC 4366).
|
|
|
008793 |
+ * client hello with a server name indication extension ("SNI", cf. RFC 6066).
|
|
|
008793 |
*/
|
|
|
008793 |
int ssl_callback_ServerNameIndication(SSL *ssl, int *al, modssl_ctx_t *mctx)
|
|
|
008793 |
{
|
|
|
008793 |
@@ -1962,7 +1962,21 @@
|
|
|
008793 |
"No matching SSL virtual host for servername "
|
|
|
008793 |
"%s found (using default/first virtual host)",
|
|
|
008793 |
servername);
|
|
|
008793 |
- return SSL_TLSEXT_ERR_ALERT_WARNING;
|
|
|
008793 |
+ /*
|
|
|
008793 |
+ * RFC 6066 section 3 says "It is NOT RECOMMENDED to send
|
|
|
008793 |
+ * a warning-level unrecognized_name(112) alert, because
|
|
|
008793 |
+ * the client's behavior in response to warning-level alerts
|
|
|
008793 |
+ * is unpredictable."
|
|
|
008793 |
+ *
|
|
|
008793 |
+ * To maintain backwards compatibility in mod_ssl, we
|
|
|
008793 |
+ * no longer send any alert (neither warning- nor fatal-level),
|
|
|
008793 |
+ * i.e. we take the second action suggested in RFC 6066:
|
|
|
008793 |
+ * "If the server understood the ClientHello extension but
|
|
|
008793 |
+ * does not recognize the server name, the server SHOULD take
|
|
|
008793 |
+ * one of two actions: either abort the handshake by sending
|
|
|
008793 |
+ * a fatal-level unrecognized_name(112) alert or continue
|
|
|
008793 |
+ * the handshake."
|
|
|
008793 |
+ */
|
|
|
008793 |
}
|
|
|
008793 |
}
|
|
|
008793 |
}
|