You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
identified by the <code>Host</code> request header in an HTTP request
3052
3052
is compatible with the <codeclass="directive"><ahref="../mod/core.html#virtualhost"><VirtualHost></a></code> identified from the SNI
@@ -3055,6 +3055,12 @@ request is associated with a virtual host which has an incompatible
3055
3055
SSL/TLS configuration under the policy used, an HTTP error response
3056
3056
with status code 421 ("Misdirected Request") will be sent.</p>
3057
3057
3058
+
<p>The policy also applies to TLS connections where an SNI extension
3059
+
is not sent during the handshake, implicitly using the default or
3060
+
first virtual host definition. If the Host header in an HTTP request
3061
+
on such a connection identifies any other non-default virtual host,
3062
+
the compatibility policy is tested.</p>
3063
+
3058
3064
<p>The <code>strict</code> policy blocks all HTTP requests which are
3059
3065
identified with a different virtual host to that identifed by SNI.
3060
3066
The <code>insecure</code> policy allows all HTTP requests regardless
@@ -3064,43 +3070,43 @@ of virtual host identified; such a configuration may be vulnerable to
3064
3070
3065
3071
<p>The (default) <code>secure</code>, and <code>authonly</code>
3066
3072
policies compare specific aspects of the SSL configuration for the two
3067
-
virtual hosts, which are grouped into two categories:
3073
+
virtual hosts, which are grouped into two categories:</p>
3068
3074
3069
3075
<ul>
3070
-
<li><strong>client vertification and authentication
3071
-
settings</strong>: directives which affect TLS client certificate
3072
-
verification or authentication, such as <codeclass="directive"><ahref="#sslverifyclient">SSLVerifyClient</a></code>, <codeclass="directive"><ahref="#sslverifymode">SSLVerifyMode</a></code>, <codeclass="directive"><ahref="#sslcacertificatepath">SSLCACertificatePath</a></code>, <codeclass="directive"><ahref="#sslsrpverifierfile">SSLSRPVerifierFile</a></code>; any use of <codeclass="directive"><ahref="#sslopensslconfcmd">SSLOpenSSLConfCmd</a></code></li>
3073
-
3074
3076
<li><strong>server certificate/key, or protocol/cipher
3075
3077
restrictions</strong>: directives which determine the server
3076
3078
certificate or key (<codeclass="directive"><ahref="#sslcertificatekeyfile">SSLCertificateKeyFile</a></code> etc), cipher or
3077
3079
protocol restrictions (<codeclass="directive"><ahref="#sslciphersuite">SSLCipherSuite</a></code> and <codeclass="directive"><ahref="#sslprotocol">SSLProtocol</a></code>)</li>
3080
+
3081
+
<li><strong>client vertification and authentication
3082
+
settings</strong>: directives which affect TLS client certificate
3083
+
verification or authentication, such as <codeclass="directive"><ahref="#sslverifyclient">SSLVerifyClient</a></code>, <codeclass="directive"><ahref="#sslverifymode">SSLVerifyMode</a></code>, <codeclass="directive"><ahref="#sslcacertificatepath">SSLCACertificatePath</a></code>, <codeclass="directive"><ahref="#sslsrpverifierfile">SSLSRPVerifierFile</a></code>; any use of <codeclass="directive"><ahref="#sslopensslconfcmd">SSLOpenSSLConfCmd</a></code></li>
3078
3084
</ul>
3079
3085
3080
-
This table illustrates whether an HTTP request will be blocked or
3086
+
<p>This table illustrates whether an HTTP request will be blocked or
3081
3087
allowed when the virtual host configurations differ as described,
0 commit comments