Hi Jason,

> I believe I've figured out the error of my ways.
> I recently changed where I'm generating SSL keys, in order to push keys to a
> R/O mount for the FE server, letting a back-end server handle the security
> aspects.
>
> The openssl on the backend/generator system is 1.0.1-4ubuntu5.14, the
> openssl on the frontend/haproxy system is 1.0.1e-2+deb7u10
>
> While they are both 1.0.1 branch versions (which would make me assume
> they're compatible), apparently they are not.

Its not that. You can generate and sign certificates even with non-openssl
tools, and still use them.



> I regenerated the keys on the frontend system, and all of the SNI
> functionality is once again working.

I suspect CN/UCC/SAN values are corrupted or wrong when coming from one
the "backend/generator" system then.

Triple check how you generate them and validate them again [1].


HAproxy/Openssl does no magic here, either the certificate contains
the proper values and SNI will work, or not.



Regards,

Lukas


[1] 
http://www.cyberciti.biz/faq/test-ssl-certificates-diagnosis-ssl-certificate/
                                          

Reply via email to