shinrich opened a new issue #7348:
URL: https://github.com/apache/trafficserver/issues/7348
This issue was observed by Vinith. He had a sni entry for one domain that
had client ip address restrictions specified in sni.yaml via the ip_allow
action. He also had the proxy.config.http.host_sni_policy set to the default
value of 2 which should be cross checking host header for security specific sni
policies if the sni and the host header value do not match. However, he was
able to evade the ip_allow policy by using a different SNI value but using the
host header for the sensitive domain.
I was able to reproduce this with the following sni.yaml file.
```
sni:
- fqdn: bar
ip_allow: '127.0.0.1'
```
When run from an adjacent machine, the this failed as expected.
```
curl -k --resolve 'bar:4443:192.168.1.12' -d stuff https://bar:4443/port
```
And this succeeded as expected.
```
curl -k --resolve 'bar:4443:192.168.1.12' -d stuff https://bar:4443/port
```
But this also succeeded which means the host_sni_policy setting was not
working for the ip_allow action
```
curl -k --resolve 'foo:4443:192.168.1.12' -d stuff https://foo:4443/post -H
'Host: bar'
```
----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:
[email protected]