Talk:Server Name Indication
|WikiProject Computing / Networking||(Rated Start-class, Low-importance)|
What is the connection of SNI with phishing? Isn't the author of the relevant paragraph confusing this with DNS hijacking or similar attacks? Phishing is tricking the user (and not his browser) into visiting a different site, such as http://firstname.lastname@example.org/ instead of https://bankofamerica.com/onlinebanking
Https and SNI would be exactly of zero help here as:
- the phisher could get a valid certificate for onlinebanking.com, as he does indeed own the site. Ok, if the user doubleclicked on the certificate, he would notice that something is amiss, but those who fall for phishing scams usually won't check certificates either
- the phisher could just trick the user into visiting a fake http site instead of a https site
Using the testing tool/site linked as a reference with Android 2.2.1, I get a result indicating SNI is not supported; thus, the assertion that Android's browser correctly supports SNI could probably use some clarification (at least to indicate a version number at which this support began). Charles-dyfis-net (talk) 23:06, 17 November 2010 (UTC)
- Same here, on Android 2.2 via CyanogenMod 6, SNI isn't supported by the default browser -- Virtualblackfox (talk) 08:47, 23 November 2010 (UTC)
"(Vista or higher. XP on Chrome 6 or newer."
This is confusing. First it reads like "Vista+", but then you can see that it also works on XP. Actually, I could successfully use it with XP and Chrome 9.0.x --126.96.36.199 (talk) 01:54, 3 March 2011 (UTC)
- AIUI earlier versions of chrome used the windows SSL/TLS library so they only supported SNI on vista and higher. Newever versions ship their own SSL library so support SNI on all versions of windows. 188.8.131.52 (talk) 15:10, 25 May 2012 (UTC)
It's mentioned that some versions of IE still do not support SNI on XP. Since SNI is quickly becoming the standard and more companies who host multiple sites are relying on the technology, I'm requesting a few more references which give support to the claims in the Support section. If this can't be found, I think a bit more elaboration can be given, which would be helpful.
- My understanding is MS consider the SSL/TLS implementation to be part of windows, not part of IE so it doesn't get updated when you update to a new IE version.
- I've found a few sites claiming that IE on XP does not support it (including one from 2011 ) and i've found one source  claiming that someone claims XP SP3 fixes this and linking to a german blog entry  but I can't make out from the google translate what the blog post is actually saying. Anyone fancy running (yeah I know it's OR but IMO OR to decide whether to trust a source is different from OR to create completely new information) some tests with various IE versions and service packs to see what the actual situation is? Plugwash (talk) 13:56, 6 January 2012 (UTC)
- I've reverted 521556297 which stated that IE8 under XP SP3 supports SNI - that's not the case as far as I can tell, per Microsoft () and testing of this specific OS/browser combination (). Shanemadden (talk) 02:35, 22 November 2012 (UTC)
There is no citation for Safari (the article claims v3+ is required). However, http://www.digicert.com/ssl-support/apache-secure-multiple-sites-sni.htm refers to "Safari 2.1 and later (requires OS X 10.5.6 and later or Windows Vista and later)". Can anyone confirm if this version supports SNI? --AlastairIrvine (talk) 10:33, 12 July 2013 (UTC)
This page needs some real stats. The combined market share of IE <9 is 5-10% but I can't break the numbers down any further. — Preceding unsigned comment added by Indolering (talk • contribs) 04:52, 26 July 2013 (UTC)