> Le 28 juil. 2017 à 17:48, Emmanuel Hocdet <m...@gandi.net> a écrit :
> 
>> 
>> Le 28 juil. 2017 à 17:13, Willy Tarreau <w...@1wt.eu> a écrit :
>> 
>> On Fri, Jul 28, 2017 at 05:04:16PM +0200, Emmanuel Hocdet wrote:
>>> I talk with the case we don't want a default cert. With strict-sni the « 
>>> fake
>>> » default_cert can be use if it as sni (i don't want that ideally).
>>> with strict-sni: no certificate match sni -> no ssl connection.
>>> I add strict-sni to haproxy because customers call when browser show warning
>>> with https on their vhost (without certificat), and they don't wont that.
>> 
>> That's a good point to keep in mind.
>> 
>>> The question is: force to have a default certificat is really necessary?
>>> generate an error or move to a warning? I understand the old use case but
>>> what about the strict-sni use case? is not incompatible with the default_ctx
>>> relax.
>> 
>> The default cert is useful every time the strict-sni is not in use. In fact
>> you are in the position of a hosting provider with no reason for presenting
>> your company's name instead of a hosted customer's cert when unknown, but
>> the other situation is very common : company "acme" has a certificate for
>> "www.acme.com" and occasionally needs a temporary vhost on "dev.acme.com"
>> or "cms.acme.com" or "support.acme.com" but they don't want to have to buy
>> and deploy an extra cert just for this, especially when they already have
>> a few domains in the alt names of the first cert. So it's very common to
>> see them just create the new name and fall back to the default cert. For
>> partners it's not a problem, they see a browser warning, they check it,
>> can confirm the cert is not for the correct hostname but valid for the same
>> domain (eg: www.acme.com when they asked for support.acme.com) and they can
>> pass through. It also happens with multi-tld names. You can have "acme.fr"
>> redirect to "acme.com" without having to buy a cert for "acme.fr". Just a
>> warning once in a while and that's all.
>> 
>> Then of course there's the case of the certificate generation on the fly
>> which needs one private key. Using that of the default cert is the current
>> choice and it makes quite some sense. It's obviously exclusive with 
>> strict-sni
>> by definition!
>> 
>> All these use cases are pretty valid and we just need to keep them all in
>> mind when seeking the proper fix.
> 
> I propose:
> strict_sni is set and generated_cert is not set: default_cert is optional 
> (with or without warning?)
> else default_cert is required

to be exact:
/default_cert/have at least one certificate in bind configuration/

Manu

Reply via email to