The short answer is:  No.

It's basically the same problem as having multiple sites sharing an IP
address.  In the SSL protocol, the server (aka Tomcat) has to send the cert
very early on in the handshake.  In particular, *before* the browser has
sent the request headers (there is no point in the browser sending
potentially sensitive info until it has decided to trust you :).  Tomcat (or
any other SSL-enabled server) simply doesn't have access to the information
it needs to do this at the time it needs to make a decision.


"Jeff Skubick" <[EMAIL PROTECTED]> wrote in message
002601c2ce30$85c7c890$0800290a@sasi">news:002601c2ce30$85c7c890$0800290a@sasi...
Suppose a webapp, "foo.war", is deployed to a single standalone Tomcat
instance, installed in c:\tomcat, on a single host whose IP address is
1.2.3.4. There are a half-dozen hostnames that resolve to 1.2.3.4, including
www.foo.com, www.bar.net, and www.boom.org. No distinction is made among the
various hostnames... virtual hosting isn't being used. As long as the user
makes a request to a hostname that resolves to 1.2.3.4, Tomcat is happy to
serve the request.

Is there any way to associate three SSL certificates with it -- one for
www.foo.com, one for www.bar.net, and one for www.boom.org, so that requests
to https://www.foo.com/foo/page.jsp, https://www.bar.net/foo/page.jsp, and
https://www.boom.org/foo/page.jsp will all satisfy both Tomcat *AND* the
browser?

Note that I'm specifically *NOT* trying to have multiple different sites
sharing the same IP address with different hostnames. I know SSL doesn't
support that. What I'm trying to do is ensure that regardless of what
hostname is used to access the https page, the browser will be presented
with a valid certificate so it won't gripe about the certificate's name not
matching the site's hostname.

I know that the usual obstacle lies with the request header itself being
encrypted. However, if that's still the case, why couldn't Tomcat just
iterate through all the plausible keys available to it, one at a time, in
descending order of likelihood, until it finds one that decrypts it into a
valid request & then send the reply with THAT one? To give a real-world
analogy, it would kind of be like when a friend asks you to watch his house
while he's out of town, hands you a ring with a dozen keys that all look
alike, and you have to try them one at a time until you find the one that
fits and unlocks the door...

Yeah, it would increase the load on the server for requests to that one
page, but seeing how the only thing on the entire site that's actually SSL
is the login page and the actual number of possible hostnames/keys is fairly
small, the performance penalty of brute force doesn't seem like all that big
of a deal.

Thanks!




---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to