https://bz.apache.org/bugzilla/show_bug.cgi?id=55707

--- Comment #24 from hasso.tep...@gmail.com ---
There are a legit reasons why users would want to allow/disable TLS versions
per virthost. I'm working for a hosting provider and I see all kind of crazy
requirements – main reasons are . Some users want to disable TLS1.0 only
(mainly PCI reasons), but ceratinly keep TLS1.1. Some users want to disable
TLSv1.0 and TLSv1.1. Some users want to disable TLSv1.3 on top of other
requirenments – missing support for Post-Handsahke Authentication in browsers
seems to be a popular reason. ETC.

In short – it would be quite a task to make configure IP for every possible TLS
combination and move virthosts (and DNS etc) accordingly.

The patch from Mike Haller works mostly and is OK with all restrictions (ie you
can't enable protocols which are disabled by default in virthosts etc). But it
doesn't work for TLSv1.3 any more and supporting it isn't trivial either
AFAICS. What I'd like is to make this configuration work:

<vhost default>
  SSLProtocol all -SSLv3
</vhost default>

<vhost A>
  SSLProtocol all -SSLv3 -TLSv1.1
</vhost A>

<vhost B>
  SSLProtocol all -SSLv3 -TLSV1.3
</vhost B>

If I'd extend the patch with support for TLS 1.3, vhost B would be just
unaccessible for all clients supporting TLS 1.3.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org

Reply via email to