On 21.12.2013 14:21, Ruediger Pluem wrote:
>> I guess a more general fix for this would be:
>
> No further comments / feedback? If not then I would commit the patch.
The change looks fine to me (for easier comparison/review,
a whitespace-change-ignoring version is attached).
What would probably make sense is to amend the following comment
on this occasion:
/*
* The SNI extension supplied a hostname. So don't accept requests
* with either no hostname or a different hostname.
*/
It doesn't say anything about the rationale right now, and as
recent discussions have shown, it would be helpful to explain
why this is done.
Kaspar
Index: ssl_engine_kernel.c
===================================================================
--- ssl_engine_kernel.c (revision 1551618)
+++ ssl_engine_kernel.c (working copy)
@@ -164,6 +164,7 @@ int ssl_hook_ReadReq(request_rec *r)
return DECLINED;
}
#ifdef HAVE_TLSEXT
+ if (r->proxyreq != PROXYREQ_PROXY) {
if ((servername = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name))) {
char *host, *scope_id;
apr_port_t port;
@@ -206,6 +207,7 @@ int ssl_hook_ReadReq(request_rec *r)
" virtual host");
return HTTP_FORBIDDEN;
}
+ }
#endif
SSL_set_app_data2(ssl, r);