From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: AS4713 221.184.0.0/13 X-Spam-Status: No, score=-4.0 required=3.0 tests=AWL,BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, SPF_PASS shortcircuit=no autolearn=ham autolearn_force=no version=3.4.2 Received: from neon.ruby-lang.org (neon.ruby-lang.org [221.186.184.75]) by dcvr.yhbt.net (Postfix) with ESMTP id A57C11F405 for ; Sun, 16 Dec 2018 18:54:08 +0000 (UTC) Received: from neon.ruby-lang.org (localhost [IPv6:::1]) by neon.ruby-lang.org (Postfix) with ESMTP id CD69B120EDE; Mon, 17 Dec 2018 03:54:05 +0900 (JST) Received: from o1678948x4.outbound-mail.sendgrid.net (o1678948x4.outbound-mail.sendgrid.net [167.89.48.4]) by neon.ruby-lang.org (Postfix) with ESMTPS id B2260120EDC for ; Mon, 17 Dec 2018 03:54:02 +0900 (JST) Received: by filter0099p3iad2.sendgrid.net with SMTP id filter0099p3iad2-10643-5C169F44-21 2018-12-16 18:53:56.539758773 +0000 UTC m=+234334.230934915 Received: from herokuapp.com (ec2-54-197-112-44.compute-1.amazonaws.com [54.197.112.44]) by ismtpd0062p1mdw1.sendgrid.net (SG) with ESMTP id KYyAe0yOTDOvSoUh3HpiYw Sun, 16 Dec 2018 18:53:56.593 +0000 (UTC) Date: Sun, 16 Dec 2018 18:53:58 +0000 (UTC) From: ruby-bugs@dienste.aaron-spettl.de To: ruby-core@ruby-lang.org Message-ID: References: Mime-Version: 1.0 X-Redmine-MailingListIntegration-Message-Ids: 65978 X-Redmine-Project: ruby-trunk X-Redmine-Issue-Id: 15215 X-Redmine-Issue-Author: aspettl X-Redmine-Sender: aspettl X-Mailer: Redmine X-Redmine-Host: bugs.ruby-lang.org X-Redmine-Site: Ruby Issue Tracking System X-Auto-Response-Suppress: All Auto-Submitted: auto-generated X-SG-EID: ync6xU2WACa70kv/Ymy4QrNMhiuLXJG8OTL2vJD1yS5qlbyn0POxQD+8GNX7GTqEb3kRQ/YmMoaEs8 24xGlFcvLAKenDei7DAp2L2oeVL5Du2jYT/krkyeeX5LqyWbSMl0EAmxB5oKHT1lipsjtgNlUlXh8S +pRu4cx6Kmo1ze4r/y41GpryOPLo2HNEAl7k1hKen40PF6GsCNI77sAxM5NPQz0sVmotsSxwrp2pDh g= X-ML-Name: ruby-core X-Mail-Count: 90572 Subject: [ruby-core:90572] [Ruby trunk Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP X-BeenThere: ruby-core@ruby-lang.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Ruby developers List-Id: Ruby developers List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: ruby-core-bounces@ruby-lang.org Sender: "ruby-core" Issue #15215 has been updated by aspettl (Aaron Spettl). I still like to have this feature. Any opinion on this? Especially @naruse as a maintainer of lib/net/http(s).rb? Thanks! ---------------------------------------- Feature #15215: HTTPS server name indication (SNI): explicit server_name in Net::HTTP https://bugs.ruby-lang.org/issues/15215#change-75725 * Author: aspettl (Aaron Spettl) * Status: Open * Priority: Normal * Assignee: * Target version: ---------------------------------------- **Current behavior and problem:** At the moment, the host name or IP address given in the URL is used to provide the server name for SNI in HTTPS connections. While this behavior is sufficient in most cases, establishing a connection to a fixed IP using a certain server name is not possible. **Proposed solution:** Decouple the server name used for SNI from the address used for connecting. Add a new ssl_server_name attribute in Net::HTTP that defaults to the address (so the default behavior stays exactly the same). **Notes** * There are scenarios where a client would like to select a specific host when e.g. DNS round robin is configured. Examples: fallback strategies, monitoring of individual hosts. * This has nothing to do with the HTTP "Host" header, which one needs to set additionally. For my "proposed solution", a patch is attached (or see https://github.com/ruby/ruby/pull/1977). Please let me know about any ideas for improvement or other approaches, thanks! ---Files-------------------------------- ssl_server_name.patch (2.17 KB) -- https://bugs.ruby-lang.org/