----- Original Message ----- From: "André Warnier" <[EMAIL PROTECTED]>
To: "Tomcat Users List" <users@tomcat.apache.org>
Sent: Monday, September 22, 2008 10:57 AM
Subject: HTTPS and Virtual Hosts


Hi.

I'm not an expert at anything below, that's why I am asking.
I am also not looking for a very precise answer, just a rough summary.

The question :

As I remember from reading about this a while ago, there is/was a fundamental incompatibility between the HTTP Virtual Host mechanism, and HTTPS/SSL, in the sense that there is some egg-and-chicken problem involved, which roughly goes like this : - the client connects to the host and requests an encrypted connection to a certain hostname - the host and client negociate the encryption (based or not on the name of the host) - on subsequent requests, the client sends the request encrypted, including the "Host:" header that (acording to the HTTP protocol) should indicate the name of the Virtual Host it wants to talk to - the server should decode the request (including this "Host:" HTTP header) in order to determine which Host the request is addressed to, but it can't because it does not know which host it is yet, and thus cannot decode the request
- we are thus stuck

Is the above, very roughly and approximatively still a valid explanation of what happens, or is it totally wrong, or has something changed in-between that I am unaware of ?

Thanks

--------------------------------------

Mmmmmmm yes... kinda

Andre check out the hand shake in SSL...
Keeping it very conceptual... the secure system between a browser and server is owned by Verisign, or GoDaddy, or whatever CA.

And it is checking a few things...
Like the domain name used and the expiry date...

So when you buy a cert and give them www.andre.com
Thats it...

This is because the cert is pulled (checked) during the handshake... and "host headers" only come later...

.... thats the official version of the story, but I actually cant see any reason why the hand shake couldnt be extended to look at the incoming URL... other than people would start doing server tricks and making extra free certs ;)

I conclude... its more about biz, that it is about technology.... certificates are sold per domain... this is the real issue ;)

Its actually interesting, because when we were making the Pojo server, this issue came up... especially because we want to give the company using the system the ability to be a CA... so we dropped the domain check, and then the only condition on the server is that the administrator knows the private key... ... clearly a really crap biz model because one can use the certs on a million servers... but an interesting thing happens...

... virtual host are NOT and issue
... Its secure on any port

Ha ha... its about the biz model.... I believe ;)

Hell they got to make money and it is beeeeeeeeeeeeeeeeeeg bucks... a local chap made a cool 3 billion dollars out of his CA ;)

.... Yup... I think its about biz ;)

---------------------------------------------------------------------------
HARBOR : http://www.kewlstuff.co.za/index.htm
The most powerful application server on earth.
The only real POJO Application Server.
See it in Action : http://www.kewlstuff.co.za/cd_tut_swf/whatisejb1.htm
---------------------------------------------------------------------------





---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to