Hi,

Le 03/07/2015 04:26, AJ ONeal (Home) a écrit :
    Sounds like that client hello from curl@mac looks different
    than we expect, therefor SNI parsing fails. Can you provide
    the same tcpdump captures again, this time from the mac
    curl client that fails?


I ran this on the server

     sudo tcpdump -ps0 -i eth0 -w eth0.64443.cap tcp port 64443

And then this on my Yosemite Mac

     curl --insecure https://baz.example.com:64443
<https://baz.example.com:64443/>

And here's the result

https://dropsha.re/files/friendly-lionfish-7/curl-v7.37.1-sni.eth0.64443.cap

At this step, this has nohing to do with haproxy.
If you look at the capture, the client (curl with SecureTransport as the SSL lib) doesn't provide any SNI information.

--
Cyril Bonté

Reply via email to