> Le 28 juil. 2017 à 17:13, Willy Tarreau <w...@1wt.eu> a écrit : > > On Fri, Jul 28, 2017 at 05:04:16PM +0200, Emmanuel Hocdet wrote: >> I talk with the case we don't want a default cert. With strict-sni the « fake >> » default_cert can be use if it as sni (i don't want that ideally). >> with strict-sni: no certificate match sni -> no ssl connection. >> I add strict-sni to haproxy because customers call when browser show warning >> with https on their vhost (without certificat), and they don't wont that. > > That's a good point to keep in mind. > >> The question is: force to have a default certificat is really necessary? >> generate an error or move to a warning? I understand the old use case but >> what about the strict-sni use case? is not incompatible with the default_ctx >> relax. > > The default cert is useful every time the strict-sni is not in use. In fact > you are in the position of a hosting provider with no reason for presenting > your company's name instead of a hosted customer's cert when unknown, but > the other situation is very common : company "acme" has a certificate for > "www.acme.com" and occasionally needs a temporary vhost on "dev.acme.com" > or "cms.acme.com" or "support.acme.com" but they don't want to have to buy > and deploy an extra cert just for this, especially when they already have > a few domains in the alt names of the first cert. So it's very common to > see them just create the new name and fall back to the default cert. For > partners it's not a problem, they see a browser warning, they check it, > can confirm the cert is not for the correct hostname but valid for the same > domain (eg: www.acme.com when they asked for support.acme.com) and they can > pass through. It also happens with multi-tld names. You can have "acme.fr" > redirect to "acme.com" without having to buy a cert for "acme.fr". Just a > warning once in a while and that's all. > > Then of course there's the case of the certificate generation on the fly > which needs one private key. Using that of the default cert is the current > choice and it makes quite some sense. It's obviously exclusive with strict-sni > by definition! > > All these use cases are pretty valid and we just need to keep them all in > mind when seeking the proper fix.
I propose: strict_sni is set and generated_cert is not set: default_cert is optional (with or without warning?) else default_cert is required ++ Manu