use FQDN for servername (SNI) #4

Closed
opened 2021-09-10 11:53:48 +02:00 by heiko · 0 comments
Owner

It seems that there is at least one MITM proxy (Sophos) that tries to use the SNI as an indication where to forward the connection to. So we should use a FQDN SNI.

Currently we use "cert-proxy" as the default. This can easily be overwritten with the -servername <FQDN> option, but OTOH, the server needs to have a certificate that uses that FQDN.

  • the CA should provide a flag to include the FQDN in the SAN, or to use the FQDN as the CN, having a SAN of the FQDN and additional short names, if necessary.

  • the client should use the name from the connect URL as the SNI, except overridden by the -servername option

It seems that there is at least one MITM proxy (Sophos) that tries to use the SNI as an indication where to forward the connection to. So we should use a FQDN SNI. Currently we use "cert-proxy" as the default. This can easily be overwritten with the `-servername <FQDN>` option, but OTOH, the server needs to have a certificate that uses that FQDN. - [ ] the CA should provide a flag to include the FQDN in the SAN, or to use the FQDN as the CN, having a SAN of the FQDN and additional short names, if necessary. - [ ] the client should use the name from the connect URL as the SNI, except overridden by the `-servername` option
heiko self-assigned this 2021-09-10 11:53:48 +02:00
heiko added this to the release 1.17 milestone 2021-09-10 11:55:30 +02:00
heiko stopped working 2021-09-28 14:24:44 +02:00
28h 1min 21s
heiko closed this issue 2022-03-18 20:42:44 +01:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Total time spent: 1 day 4 hours
heiko
1 day 4 hours
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
heiko/cert-proxy#4
No description provided.