On Wed, Jun 10, 2015 at 5:48 PM, Yann Ylavic <ylavic....@gmail.com> wrote: > On Wed, Jun 10, 2015 at 5:30 PM, Yann Ylavic <ylavic....@gmail.com> wrote: >> On Wed, Jun 10, 2015 at 4:41 PM, Stefan Eissing >> <stefan.eiss...@greenbytes.de> wrote: >>> Today I had the second user which got "400 Bad Request" when using mod_h2 >>> with a wildcard certificate. So, I was thinking how to possibly fix the >>> code in mod_ssl. >>> >>> The mostly harmless approach is the addition of a configuration directive >>> that admins may use to explicitly allow multiple host requests on a SNI >>> connection. Which would mean that both the config of the SNI host and the >>> config of the request host have "SSLSNIVHostMatch off". >>> >>> The case where no Host header is provided or no SNI is used I propose to >>> leave unaffected, e.g. continue to fail. >>> >>> Any thoughts? >> >> Maybe matching against the ServerName and ServerAlias(es) instead of >> the Host header, so that the admin can still have a control on it... > > E.g. by using ap_matches_request_vhost(r, SNI, 0).
Or likewise with the SAN (SubjectAltName(s) of the server certificate). => SSLSNIHostMatch on/vhost/SAN and possibly off (I'd prefer we had not to...).