2011/10/3 Evgeniy Khramtsov <xramt...@gmail.com>:
>> Since most of the SIP clients don't yet examine such SubjectAltName in
>> a received certificate, and none of them implements SNI, I strongly
>> think that it's much better for them to implement SubjectAltName
>> inspection (which is already defined for SIP) rather than implementing
>> SNI.
>>
>> Regards.
>
> As I understand, SubjectAltName won't work for virtual servers holding
> lots of separate certificates and listening on the same port.

Why not? the client wants to establish a TLS connection with domain
"example1.org", so after DNS procedures it establishes a TLS
connection with the server and the server sends its TLS certificate.
Such certificate contains varios SubjectAltName fields with values:

- sip:example1.org
- sip:example2.org
- sip:example3.org

The client checks that "sip:example1.org" is present so *that's all*.
And this is clearly explained in RFC 5922 (which updates RFC 3261):

  http://tools.ietf.org/html/rfc5922#section-7.1

Regards.

-- 
Iñaki Baz Castillo
<i...@aliax.net>

_______________________________________________
Sip-implementors mailing list
Sip-implementors@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to