> On May 9, 2018, at 10:07 PM, Martin Thomson <martin.thom...@gmail.com> wrote:
> 
> This alert is actually fairly common (though I'm surprised to see OpenSSL
> still doing it) and clients need to handle it, unfortunately. 

I may be misreading the code, but it sure looks like the alert is only
sent if the application callback for the server name extension  asks
OpenSSL to do that.  The application can just decline the extension
and let the handshake continue with a default certificate...  Is
the surprise that the alert is sent, or that it is a warning, or
something else?

-- 
-- 
        Viktor.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to