ruby-core@ruby-lang.org archive (unofficial mirror)
 help / color / mirror / Atom feed
* [ruby-core:89305] [Ruby trunk Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP
       [not found] <redmine.issue-15215.20181007092052@ruby-lang.org>
@ 2018-10-07  9:20 ` ruby-bugs
  2018-10-07  9:45 ` [ruby-core:89307] " ruby-bugs
                   ` (3 subsequent siblings)
  4 siblings, 0 replies; 5+ messages in thread
From: ruby-bugs @ 2018-10-07  9:20 UTC (permalink / raw)
  To: ruby-core

Issue #15215 has been reported by aspettl (Aaron Spettl).

----------------------------------------
Feature #15215: HTTPS server name indication (SNI): explicit server_name in Net::HTTP
https://bugs.ruby-lang.org/issues/15215

* Author: aspettl (Aaron Spettl)
* Status: Open
* Priority: Normal
* Assignee: 
* Target version: 
----------------------------------------
**Current behavior and problem:**
At the moment, the host name or IP address given in the URL is used to provide the server name for SNI in HTTPS connections. While this behavior is sufficient in most cases, establishing a connection to a fixed IP using a certain server name is not possible.

**Proposed solution:**
Decouple the server name used for SNI from the address used for connecting. Add a new ssl_server_name attribute in Net::HTTP that defaults to the address (so the default behavior stays exactly the same).

**Notes**
* There are scenarios where a client would like to select a specific host when e.g. DNS round robin is configured. Examples: fallback strategies, monitoring of individual hosts.
* This has nothing to do with the HTTP "Host" header, which one needs to set additionally.

For my "proposed solution", a patch is attached (or see https://github.com/ruby/ruby/pull/1977).
Please let me know about any ideas for improvement or other approaches, thanks!

---Files--------------------------------
ssl_server_name.patch (2.17 KB)


-- 
https://bugs.ruby-lang.org/

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [ruby-core:89307] [Ruby trunk Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP
       [not found] <redmine.issue-15215.20181007092052@ruby-lang.org>
  2018-10-07  9:20 ` [ruby-core:89305] [Ruby trunk Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP ruby-bugs
@ 2018-10-07  9:45 ` ruby-bugs
  2018-12-16 18:53 ` [ruby-core:90572] " ruby-bugs
                   ` (2 subsequent siblings)
  4 siblings, 0 replies; 5+ messages in thread
From: ruby-bugs @ 2018-10-07  9:45 UTC (permalink / raw)
  To: ruby-core

Issue #15215 has been updated by aspettl (Aaron Spettl).


aspettl (Aaron Spettl) wrote:
> **Proposed solution:**
> Decouple the server name used for SNI from the address used for connecting. Add a new ssl_server_name attribute in Net::HTTP that defaults to the address (so the default behavior stays exactly the same).

One comment on a corner case:
When ssl_server_name is set, then it is always used for verifying the certificate - even when OpenSSL is old and does not support SNI yet. In such a case, the certificate presented by the server will not match probably (and, thus, verification fails). I think this is desired behavior.

----------------------------------------
Feature #15215: HTTPS server name indication (SNI): explicit server_name in Net::HTTP
https://bugs.ruby-lang.org/issues/15215#change-74335

* Author: aspettl (Aaron Spettl)
* Status: Open
* Priority: Normal
* Assignee: 
* Target version: 
----------------------------------------
**Current behavior and problem:**
At the moment, the host name or IP address given in the URL is used to provide the server name for SNI in HTTPS connections. While this behavior is sufficient in most cases, establishing a connection to a fixed IP using a certain server name is not possible.

**Proposed solution:**
Decouple the server name used for SNI from the address used for connecting. Add a new ssl_server_name attribute in Net::HTTP that defaults to the address (so the default behavior stays exactly the same).

**Notes**
* There are scenarios where a client would like to select a specific host when e.g. DNS round robin is configured. Examples: fallback strategies, monitoring of individual hosts.
* This has nothing to do with the HTTP "Host" header, which one needs to set additionally.

For my "proposed solution", a patch is attached (or see https://github.com/ruby/ruby/pull/1977).
Please let me know about any ideas for improvement or other approaches, thanks!

---Files--------------------------------
ssl_server_name.patch (2.17 KB)


-- 
https://bugs.ruby-lang.org/

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [ruby-core:90572] [Ruby trunk Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP
       [not found] <redmine.issue-15215.20181007092052@ruby-lang.org>
  2018-10-07  9:20 ` [ruby-core:89305] [Ruby trunk Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP ruby-bugs
  2018-10-07  9:45 ` [ruby-core:89307] " ruby-bugs
@ 2018-12-16 18:53 ` ruby-bugs
  2019-08-19  1:44 ` [ruby-core:94421] [Ruby master " not.waf
  2019-12-09 11:17 ` [ruby-core:96157] " naruse
  4 siblings, 0 replies; 5+ messages in thread
From: ruby-bugs @ 2018-12-16 18:53 UTC (permalink / raw)
  To: ruby-core

Issue #15215 has been updated by aspettl (Aaron Spettl).


I still like to have this feature. Any opinion on this? Especially @naruse as a maintainer of lib/net/http(s).rb?

Thanks!

----------------------------------------
Feature #15215: HTTPS server name indication (SNI): explicit server_name in Net::HTTP
https://bugs.ruby-lang.org/issues/15215#change-75725

* Author: aspettl (Aaron Spettl)
* Status: Open
* Priority: Normal
* Assignee: 
* Target version: 
----------------------------------------
**Current behavior and problem:**
At the moment, the host name or IP address given in the URL is used to provide the server name for SNI in HTTPS connections. While this behavior is sufficient in most cases, establishing a connection to a fixed IP using a certain server name is not possible.

**Proposed solution:**
Decouple the server name used for SNI from the address used for connecting. Add a new ssl_server_name attribute in Net::HTTP that defaults to the address (so the default behavior stays exactly the same).

**Notes**
* There are scenarios where a client would like to select a specific host when e.g. DNS round robin is configured. Examples: fallback strategies, monitoring of individual hosts.
* This has nothing to do with the HTTP "Host" header, which one needs to set additionally.

For my "proposed solution", a patch is attached (or see https://github.com/ruby/ruby/pull/1977).
Please let me know about any ideas for improvement or other approaches, thanks!

---Files--------------------------------
ssl_server_name.patch (2.17 KB)


-- 
https://bugs.ruby-lang.org/

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [ruby-core:94421] [Ruby master Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP
       [not found] <redmine.issue-15215.20181007092052@ruby-lang.org>
                   ` (2 preceding siblings ...)
  2018-12-16 18:53 ` [ruby-core:90572] " ruby-bugs
@ 2019-08-19  1:44 ` not.waf
  2019-12-09 11:17 ` [ruby-core:96157] " naruse
  4 siblings, 0 replies; 5+ messages in thread
From: not.waf @ 2019-08-19  1:44 UTC (permalink / raw)
  To: ruby-core

Issue #15215 has been updated by waf (felix wong).


aspettl (Aaron Spettl) wrote:
> I still like to have this feature. Any opinion on this? Especially @naruse as a maintainer of lib/net/http(s).rb?
> 
> Thanks!

+1 as well

----------------------------------------
Feature #15215: HTTPS server name indication (SNI): explicit server_name in Net::HTTP
https://bugs.ruby-lang.org/issues/15215#change-80842

* Author: aspettl (Aaron Spettl)
* Status: Open
* Priority: Normal
* Assignee: 
* Target version: 
----------------------------------------
**Current behavior and problem:**
At the moment, the host name or IP address given in the URL is used to provide the server name for SNI in HTTPS connections. While this behavior is sufficient in most cases, establishing a connection to a fixed IP using a certain server name is not possible.

**Proposed solution:**
Decouple the server name used for SNI from the address used for connecting. Add a new ssl_server_name attribute in Net::HTTP that defaults to the address (so the default behavior stays exactly the same).

**Notes**
* There are scenarios where a client would like to select a specific host when e.g. DNS round robin is configured. Examples: fallback strategies, monitoring of individual hosts.
* This has nothing to do with the HTTP "Host" header, which one needs to set additionally.

For my "proposed solution", a patch is attached (or see https://github.com/ruby/ruby/pull/1977).
Please let me know about any ideas for improvement or other approaches, thanks!

---Files--------------------------------
ssl_server_name.patch (2.17 KB)


-- 
https://bugs.ruby-lang.org/

^ permalink raw reply	[flat|nested] 5+ messages in thread

* [ruby-core:96157] [Ruby master Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP
       [not found] <redmine.issue-15215.20181007092052@ruby-lang.org>
                   ` (3 preceding siblings ...)
  2019-08-19  1:44 ` [ruby-core:94421] [Ruby master " not.waf
@ 2019-12-09 11:17 ` naruse
  4 siblings, 0 replies; 5+ messages in thread
From: naruse @ 2019-12-09 11:17 UTC (permalink / raw)
  To: ruby-core

Issue #15215 has been updated by naruse (Yui NARUSE).


Duplicated with #5180.
Since there're 3 layers:
* host address for TCP/IP
* TLS server name
* HTTP Host header

In this use case, I think you wan to set different value for IP layer.
If you forget to change HTTP Host header, it will cause unexpected result if the server uses VirtualHost.

I understand this ticket and related GitHub PRs as +1 for #5180, and I reopen it and commit.

----------------------------------------
Feature #15215: HTTPS server name indication (SNI): explicit server_name in Net::HTTP
https://bugs.ruby-lang.org/issues/15215#change-83033

* Author: aspettl (Aaron Spettl)
* Status: Open
* Priority: Normal
* Assignee: 
* Target version: 
----------------------------------------
**Current behavior and problem:**
At the moment, the host name or IP address given in the URL is used to provide the server name for SNI in HTTPS connections. While this behavior is sufficient in most cases, establishing a connection to a fixed IP using a certain server name is not possible.

**Proposed solution:**
Decouple the server name used for SNI from the address used for connecting. Add a new ssl_server_name attribute in Net::HTTP that defaults to the address (so the default behavior stays exactly the same).

**Notes**
* There are scenarios where a client would like to select a specific host when e.g. DNS round robin is configured. Examples: fallback strategies, monitoring of individual hosts.
* This has nothing to do with the HTTP "Host" header, which one needs to set additionally.

For my "proposed solution", a patch is attached (or see https://github.com/ruby/ruby/pull/1977).
Please let me know about any ideas for improvement or other approaches, thanks!

---Files--------------------------------
ssl_server_name.patch (2.17 KB)


-- 
https://bugs.ruby-lang.org/

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2019-12-09 11:17 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <redmine.issue-15215.20181007092052@ruby-lang.org>
2018-10-07  9:20 ` [ruby-core:89305] [Ruby trunk Feature#15215] HTTPS server name indication (SNI): explicit server_name in Net::HTTP ruby-bugs
2018-10-07  9:45 ` [ruby-core:89307] " ruby-bugs
2018-12-16 18:53 ` [ruby-core:90572] " ruby-bugs
2019-08-19  1:44 ` [ruby-core:94421] [Ruby master " not.waf
2019-12-09 11:17 ` [ruby-core:96157] " naruse

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).