This makes sense to me.
Mounir IDRASSI talked about the SNI which made sense but the solution was not 
an option. 
Your suggestion is a little complex to setup in my load balancer, but very 
doable and does not create a OS or Browser requirement.

I am very new to this list but you guys rock, I guess I was expecting the 
typical list responses, not intellegent ones like you guys gave.

Thank you.

Richard L.  Buskirk
Senior Software Developer 
Indatus



-----Original Message-----
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Jakob Bohm
Sent: Friday, July 16, 2010 10:07 AM
To: openssl-users@openssl.org
Subject: Re: Issue with clients Operating System on certs

On 16-07-2010 15:31, Richard Buskirk wrote:
> I sent this situation off to the help team but maybe it is either that stupid 
> or that hard.
>
> I have installed 2 SSL Certs on my server.
> I am using a naming convention for apache configuration for each cert.
>
> Server: Windows server 2008, Apache/2.2.14 (Win32) mod_ssl/2.2.14 
> OpenSSL/0.9.8k PHP/5.2.11
>
> httpd-vhost.conf
> ___________________________
> NameVirtualHost *:443
> <VirtualHost *:443>
>      SSLEngine on
>      SSLCertificateFile "C:\\certs\\ServerA.crt"
>      SSLCertificateKeyFile "C:\\certs\\ ServerA.key"
>      ServerName www. ServerA.com
>      SSLOptions StrictRequire
>      SSLProtocol all -SSLv2
>      ServerAdmin notice@ ServerA.com
>      DocumentRoot "C:\\Program Files (x86)\\Apache Software 
> Foundation\\Apache2.2\\www\\html\\ ServerA "
>      ErrorLog "C:\\Program Files (x86)\\Apache Software 
> Foundation\\Apache2.2\\logs\\ssl-access- ServerA.log"
>      CustomLog "logs/access-ssl-www. ServerA.com" common
> </VirtualHost>
>
>
> <VirtualHost *:443>
>      SSLEngine on
>      SSLCertificateFile "C:\\certs\\ ServerB.crt"
>      SSLCertificateKeyFile "C:\\certs\\ ServerB.key"
>      ServerName www. ServerB.com
>      SSLOptions StrictRequire
>      SSLProtocol all -SSLv2
>      ServerAdmin notice@ ServerB.com
>      DocumentRoot "C:\\Program Files (x86)\\Apache Software 
> Foundation\\Apache2.2\\www\\html\\ ServerB "
>      ErrorLog "C:\\Program Files (x86)\\Apache Software 
> Foundation\\Apache2.2\\logs\\ssl-access- ServerB.log"
>      CustomLog "logs/access-ssl-www. ServerB.com" common
> </VirtualHost>
>
>
> Here is where my senerio goes very weird.  A computer with windows 7 browses 
> to both location and everything is perfect.
> A computer with windows XP browses to the siteA no issue. But if they go to 
> siteB, the cert for Site A is used on SiteB's load every time no matter what 
> computer they are on.
> The siteB does show the proper site but the cert is the wrong cert. This 
> fails in Firefox, IE, Safari, Google Chrome on windows XP.
>
>
>
> Any suggestions ?
> Does this make sense what I am saying?
>
It looks like you are trying to serve up two different certificates on 
the same IP address (all addresses of your sever=*) and port (443), 
depending on the DNS name the browser used to locate the server.

This is a very recent extension to the SSL/TLS protocols and is probably 
only implemented by a few very new browsers, such as the IE version in 
Windows 7.  Older browsers not implementing this recent
standard just have no way of telling the server which certificate they
want, and so the server uses the first one in its configuration.

There are two standard solutions to this problem (until most of the
worlds SSL clients implement the extensions):

A) Give your server two IP addresses (such as 10.0.0.1 and 10.0.0.2),
make www.ServerA.com point to 10.0.0.1 and www.ServerB.com point to
10.0.0.2.  Finally, in your Apache config, specify those addresses in
place of the * for the different configurations.
   Benefit: Traditional.  Problem: Uses more IPv4 addresses.

B) Get the CA to issue a single certificate valid for both server names
(e.g. by specifying both names in various certificate fields).  Then 
tell Apache to do normal virtual hosting but with a single SSL certificate.
    Benefit: Uses only one IPv4 address per server.
    Problem: Not all combinations of server names can be combined in
   a single certificate if compatibility with many browser
   implementations is needed.  Others on this list can probabably say
   which combinations are technically possible, and how.



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to