Opened 11 years ago

Closed 9 years ago

Last modified 9 years ago

#349 closed defect (invalid)

TLS SNI alerts on LDAP vhosts

Reported by: presbrey Owned by:
Priority: normal Milestone:
Component: web Keywords:


void is a scripts-vhost:

presbrey@dr-wily:~$ host is an alias for has address

that fails to handshake:

presbrey@dr-wily:~$ curl -k
curl: (35) error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112)

even though scripts-vhosts itself works:

presbrey@dr-wily:~$ curl -kv
* About to connect() to port 443 (#0)
*   Trying connected
* Connected to ( port 443 (#0)
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS handshake, Server key exchange (12):
* SSLv3, TLS handshake, Server finished (14):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSL connection using DHE-RSA-AES256-SHA
* Server certificate:
*        subject: serialNumber=sKLt5io360jM-oAd2EGLNK0EraXwXE46; C=US; ST=Massachusetts; L=Cambridge; O=Massachusetts Institute of Technology; web hosting service;
*        start date: 2011-05-24 11:40:52 GMT
*        expire date: 2016-06-24 16:28:06 GMT
*        subjectAltName does not match
> GET / HTTP/1.1
> User-Agent: curl/7.21.0 (x86_64-pc-linux-gnu) libcurl/7.21.0 OpenSSL/0.9.8o zlib/ libidn/1.15 libssh2/1.2.6
> Host:
> Accept: */*
< HTTP/1.1 200 OK
< Date: Thu, 28 Feb 2013 02:21:46 GMT

The problem has to do with TLS SNI extensions. TLS Alert 1112 is Level 1 (Warning) and Code 112 (Unrecognized name). This error is intended to notify the client that the server may not do what the client is expecting when the server does not recognize the SNI hostname passed by the client.

The server-side TLS SNI that validates "recognized" hostnames apparently only checks against hardcoded ServerName?(s) and ServerAlias?(s), and fails to locate LDAP vhosts as valid SNI targets.

Change History (3)

comment:2 Changed 9 years ago by geofft

  • Resolution set to invalid
  • Status changed from new to closed

I think so, and also this is fixed in OpenSSL 1.0, which is pretty safe to assume at this point. (This bug was filed on Linerva, which was last running squeeze.)

comment:3 Changed 9 years ago by kaduk

I'm not sure that openssl 1.0 can be assumed to be present everywhere. For example, FreeBSD 8.4 is still in support but ships with openssl 0.9.8zd or thereabouts

Note: See TracTickets for help on using tickets.