Personally, I am looking for an option where I do not have to keep "old" vhosts 
around.

Also, I would like to avoid that someone points "beastlovers.net" to my ip 
address and
people get the greenbytes.de homepage when follwing some spam/phishing mails 
(this is
a theoretical thread model, rest assured).

-Stefan

> Am 24.05.2018 um 13:50 schrieb Barry Pollard <barry_poll...@hotmail.com>:
> 
> 
> 
>> On 24 May 2018, at 12:44, Eric Covener <cove...@gmail.com> wrote:
>> 
>> On Thu, May 24, 2018 at 7:34 AM, Stefan Eissing
>> <stefan.eiss...@greenbytes.de> wrote:
>>> 
>>> 
>>>> Am 24.05.2018 um 13:28 schrieb Eric Covener <cove...@gmail.com>:
>>>> 
>>>> On Thu, May 24, 2018 at 7:23 AM, Stefan Eissing
>>>> <stefan.eiss...@greenbytes.de> wrote:
>>>>> Do we have a configuration option to allow https://hostname/ only to 
>>>>> matching vhosts without any default fallback?
>>>>> 
>>>>> Scenario:
>>>>> - a site with vhost A and B
>>>>> - vhost B is taken out, DNS still points there (for a while)
>>>>> - browsers opening https://B/ will get the certificate of A and complain
>>>>> 
>>>>> I do not want to present a "wrong" certificate, I want the SSL connection 
>>>>> to fail. Does that make sense?
>>>> 
>>>> I don't think it exists for SSL or non-SSL today -- you have to
>>>> capture them in the first-listed VH for a address/port combo.
>>> 
>>> Which, in case of SSL, needs to present a certificate that does not match 
>>> and browsers issue their "not trustworthy" warnings. Where, in reality (ha, 
>>> reality on the internet!) the site does not exist and it is impossible to 
>>> make a secure connection to it.
>>> 
>>> So, we are lacking an option here to abort SSL connections without a vhost 
>>> match, it seems. Something like
>>> 
>>> SSLStrictSNIVHostCheck require-match
>> 
>> a more user oriented option:
>> 
>> SSLUseDefaultCertificate OFF|ON
>> Default: ON
>> When the server cannot find a matching virtual host for an SSL
>> request, it will uses the certificate configured in the default
>> virtual host for an address:port combination. Setting this directive
>> to OFF will instead { abort the connection, send an alert, halt and
>> catch fire}.
> 
> Sorry for butting in but I’d personally prefer an option like this:
> 
> AllowConnections off
> 
> Or
> 
> DropConnection on
> 
> Think that is more flexible as that way you could disable some specific hosts 
> and leave the default there. Or you could have the default as off. This would 
> also allow you to do the same for HTTP sites.
> 
> 

Reply via email to