Dne Út 18. února 2014 10:16:15, Daniel Kahn Gillmor napsal(a):
> On 02/18/2014 08:14 AM, Pavel Matěja wrote:
> > There is one big risk when someone uses reverse HTTPS proxy with
> > ServerAlias.
> > 
> > Let say you have on both - backend and proxy servers options:
> > ServerName www.example.com
> > ServerAlias example.com
> > 
> > In old non-SNI days everything was working just fine.
> > 
> > Now when one client connects to proxy and requires www.example.com,
> > connection is established to backend server with SNI hostname set to
> > www.example.com. Second client connects to proxy and requires
> > example.com. Worker is matched because there is just one. Connection is
> > reused but you will get 4xx Bad Request because there is mismatch between
> > old and current SNI hostname.
> It seems like an administrator could avoid this risk by doing hostname
> canonicalization via external redirect at the proxy itself.  This
> probably isn't a currently common practice, but for sites who should
> canonicalize their hostnames, i don't see it as particularly onerous.
> 
> The main concern would be for non-canonicalized hostnames.  e.g.
> *.example.com, where each user of a service gets to set up
> https://$USERNAME.example.com/.  A proxy would need to pass this
> information through to the origin server -- so in the scenario you
> describe, a reverse proxy could run into serious trouble.
> 
>       --dkg

I know.
We have two slightly different webs like foo.com and bar.eu which shared one 
virtual server 
on reverse proxy. Backend server distinguishes between them by hostname in 
handler.
I had to create two separate vitual servers on reverse proxy using two 
different fake 
hostnames for backend server with same ip to distinguish workers in 
ap_proxy_get_worker().

Another workaround I know about is to downgrade proxy - backend connection to 
SSLv3 only.
-- 
Pavel Matěja

Reply via email to