Hi,

On Thu, Jul 27, 2017 at 05:17:36AM +0200, Willy Tarreau wrote:
> On Wed, Jul 26, 2017 at 02:19:19PM -0700, Kevin McArthur wrote:
> > If a check is going to validate its sni/hostname
> > going forward I'll have to figure out some sort of self-signed setup for the
> > internal.* domains that cant easily be letsenc'd. Alternatively you guys can
> > add check-ssl-verifypeer none option or similar, or change the behavior of
> > verifyhost to match a default rather than be an override.
> 
> After a night on it, I now think I'll try to go down that route. But probably
> not today.

I've now done it and run multiple tests on it, it's OK so I've just merged
it in the following commits :

  ad92a9a BUG/MINOR: ssl: make use of the name in SNI before verifyhost
  71d058c MINOR: ssl: add a new error codes for wrong server certificates
  46d5b08 BUG/MEDIUM: stream: don't retry SSL connections which fail the SNI 
name check

This way it doesn't affect whatever used to work before and enables
support of SNI without having to switch to "verify none". I think we'll
soon backport the whole series to 1.7 and maybe 1.6, though the current
behaviour matches documentation, it's just that it's impossible to secure
it by design.

Willy

Reply via email to