Server Name Indication

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Rosuav (talk | contribs) at 07:21, 30 August 2013 (→‎Support: Add Pike to the list - works beautifully). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Server Name Indication (SNI) is an extension to the TLS protocol[1] that indicates what hostname the client is attempting to connect to at the start of the handshaking process. This allows a server to present multiple certificates on the same IP address and port number and hence allows multiple secure (HTTPS) websites (or any other Service over TLS) to be served off the same IP address without requiring all those sites to use the same certificate. It is the conceptual equivalent to HTTP/1.1 virtual hosting for HTTPS.

To make use of SNI practical, it is necessary that the vast majority of users use web browsers that support it. Users whose browsers do not support SNI will be presented with a default certificate and hence are likely to receive certificate warnings. As of November 2012, the only major user bases whose browsers do not support SNI appear to be users of Android 2.x (default browser), Internet Explorer (any version) on Windows XP and versions of Java before 1.7 on any operating system.

Background of the problem

When making a TLS connection the client requests a digital certificate from the web server; once the server sends the certificate, the client examines it and compares the name it was trying to connect to with the name(s) included in the certificate. If a match is found the connection proceeds as normal. If a match is not found the user may be warned of the discrepancy and the connection may be aborted as the mismatch may indicate an attempted man-in-the-middle attack. However, some applications allow the user to bypass the warning to proceed with the connection, with the user taking on the responsibility of trusting the certificate and, by extension, the connection.

It is possible for one certificate to cover multiple hostnames. The X.509 v3 specification introduced the subjectAltName field which allows one certificate to specify more than one domain and the usage of wildcards in both the common name and subjectAltName fields. However it may be impractical -or even impossible, due to lack of a full list of all names in advance- to obtain a single certificate that covers all names a server will be responsible for. As such a server that is responsible for multiple hostnames is likely to need to present a different certificate for each name (or small group of names). Since 2005, CAcert has run experiments on different methods of using TLS on virtual servers.[2] Most of the experiments are unsatisfactory and impractical. For example, it is possible to use subjectAltName to contain multiple domains controlled by one person[3] in a single certificate. Such "unified communications certificates" must be reissued every time the list of domains changes.

Name-based virtual hosting allows multiple DNS hostnames to be hosted by a single server (usually a web server) on the same IP address. To achieve this the server uses a hostname presented by the client as part of the protocol (for HTTP the name is presented in the host header). However when using HTTPS the TLS handshake happens before the server sees any HTTP headers. Therefore it is not possible for the server to use the information in the HTTP host header to decide which certificate to present and as such only names covered by the same certificate can be served from the same IP address.

In practice, this means that an HTTPS server can only serve one domain (or small group of domains) per IP address for secured browsing. Assigning a separate IP address for each site increases the cost of hosting since requests for IP addresses must be justified to the regional internet registry and IPv4 addresses are now in short supply. The result is that many websites are effectively prevented from using secure communications.

How SNI fixes the problem

An extension to TLS called Server Name Indication (SNI) addresses this issue by sending the name of the virtual domain as part of the TLS negotiation.[4] This enables the server to select the correct virtual domain early and present the browser with the certificate containing the correct name. Therefore with clients and servers that support SNI, a single IP address can be used to serve a group of domain names for which it is impractical to get a common certificate.

Support

In 2004, a patch for adding TLS/SNI into OpenSSL was created by the EdelKey project.[5] In 2006, this patch was then ported to the development branch of OpenSSL, and in 2007 it was back-ported to OpenSSL 0.9.8.

To support SNI the TLS library used by an application must support it and the application must pass the hostname to the TLS library. Further complicating matters the TLS library may be either shipped as part of the application or may be a component of the operating system. As a result of this some browsers support SNI on all operating systems while others only support it on a subset of operating systems. As of 2011 most web browsers and TLS libraries have implemented support for SNI but there are still a large number of users still using combinations of browser and operating system that do not support it.[citation needed]

Browsers with support for TLS server name indication[6]

Servers

Libraries

  • Mozilla NSS 3.11.1[28] client-side only
  • OpenSSL
    • 0.9.8f (released 11 Oct 2007) - not compiled in by default, can be compiled in with config option '--enable-tlsext'.
    • 0.9.8j (released 07 Jan 2009) through 1.0.0 (released 29 March 2010) - compiled in by default
  • GnuTLS[29]
  • libcurl / cURL since 7.18.1 (released 30 Mar 2008) when compiled against an SSL/TLS toolkit with SNI support
  • Python 3.2 (ssl, urllib[2] and httplib modules) [30]
  • Qt 4.8[31]
  • Oracle Java 7 JSSE [32]
  • wget 1.14[33]
  • Android 2.3 (Gingerbread) has partial support if application uses HttpsURLConnection class.[34]
  • Android 3.0 (Honeycomb) has full support[35]
  • IO::Socket::SSL (Perl/CPAN module, since version 1.83 [36])
  • Pike 7.9.5 (SSL module) [37]

No support

The following combinations do not support SNI:

Client side

Server side

Libraries

References

  1. ^ "Server Name Indication". Transport Layer Security (TLS) Extensions. p. 8. sec. 3.1. doi:10.17487/RFC3546. RFC 3546.
  2. ^ "CAcert VHostTaskForce". CAcert Wik.
  3. ^ "What is a Multiple Domain (UCC) SSL Certificate?".
  4. ^ "TLS Server Name Indication". Paul's Journal.
  5. ^ "EdelKey Project".
  6. ^ Brand, Kaspar (29 March 2009). "TLS SNI Test Site".
  7. ^ http://blogs.msdn.com/b/ieinternals/archive/2009/12/07/certificate-name-mismatch-warnings-and-server-name-indication.aspx
  8. ^ Opera (25 February 2005). "Changelog for Opera [8] Beta 2 for Windows". Opera Changelogs for Windows. Opera.com. Archived from the original (via Archive.org) on 23 November 2005. Readded experimental support for TLS Extensions and TLS 1.1. Setting is disabled by default. {{cite web}}: External link in |work= (help)
  9. ^ "Google Chrome, Issue 43142, Use SSLClientSocketNSS on Windows by default". 2010-10-29 - Although many report Chrome 8 does not work with SNI on XP and Win7. {{cite web}}: Check date values in: |date= (help)
  10. ^ "Bug 122433: Server Name Identification support". Bugs.kde.org. Retrieved 18 July 2011.
  11. ^ Kehrer, Paul. "SNI in iOS 4.0". Retrieved 22 November 2010.
  12. ^ "Issue 12908 - android Https - websites that support Server Name Indication (SNI) don't work". code.google.com. Retrieved 23 August 2011.
  13. ^ "Bug 34607: Support for Server Name Indication". Apache Software Foundation.
  14. ^ "Revision 776281: adding support for Server Name Indication to the Apache 2.2.x branch". Apache Software Foundation.
  15. ^ "CHANGES: Server Name Indication support is listed under the changes for Apache 2.2.12". Apache Software Foundation.
  16. ^ Notaras, George (10 August 2007). "SSL-enabled Name-based Apache Virtual Hosts with mod_gnutls".
  17. ^ "What's New in IIS 8". weblogs.asp.net. Retrieved 1 April 2012.
  18. ^ "#386 (TLS servername extension (SNI) for namebased TLS-vhosts)". Trac.lighttpd.net. Retrieved 8 March 2011.
  19. ^ "1.4.24 - now with TLS SNI and money back guarantee". Blog.lighttpd.net. Retrieved 8 March 2011.
  20. ^ "sol13452: Configuring a virtual server to serve multiple HTTPS sites using TLS Server Name Indication (SNI) feature". ask.f5.com. Retrieved 26 March 2012.
  21. ^ "Apsis Gmbh". apsis.ch. Retrieved 18 August 2011.
  22. ^ "Open Source PageKite". PageKite.net. Retrieved 18 April 2012.
  23. ^ "SSL/TLS back-ends, endpoints and SNI". PageKite.net. Retrieved 18 April 2012.
  24. ^ Features of Saetta web server
  25. ^ "Configuring an SSL Virtual Server for Secure Hosting of Multiple Sites". Citrix. Retrieved 5 July 2012.
  26. ^ "Introducing AlteonOS 28.1! - Knowledge Base - Radware". kb.radware.com. Retrieved 20 August 2012.
  27. ^ "HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer".
  28. ^ "NSS 3.11.1 Release Notes". Mozilla.org. Retrieved 8 March 2011.
  29. ^ "TLS Extensions". Gnu.org. 1 August 2010. Retrieved 8 March 2011.
  30. ^ a b "Support TLS SNI extension in ssl module". Bugs.python.org. Retrieved 8 March 2011.
  31. ^ a b "QTBUG-1352. It would be useful if QSslSocket supports TLS extensions such as Server Name Indication as per RFC 3546". Qt Bug Tracker. Retrieved 15 April 2011.
  32. ^ "Java SE 7 Release Security Enhancements". download.oracle.com. Retrieved 12 December 2012.
  33. ^ "News: GNU wget 1.14 released". GNU Wget. 19 October 2012.
  34. ^ "Android's HTTP Clients". Google. Retrieved 3 August 2012.
  35. ^ "Issue 12908: Https websites that support Server Name Indication (SNI) don't work". Google. Retrieved 3 August 2012.
  36. ^ "IO::Socket::SSL Changes file mentions introduction of SNI".
  37. ^ "Pike's SSL module". Retrieved 30 August 2013.
  38. ^ "Understanding Certificate Name Mismatches". Blogs.msdn.com. Retrieved 8 March 2011.
  39. ^ "Android issue 1290 - Https websites that support Server Name Indication (SNI) don't work". Code.google.com. 1 December 2010. Retrieved 13 December 2011.
  40. ^ "IBM HTTP Server SSL Questions and Answers". Publib.boulder.ibm.com. Retrieved 8 March 2011.
  41. ^ "IHS 8 powered by Apache 2.2.x ?". Publib.boulder.ibm.com. Retrieved 8 March 2011.
  42. ^ "NSS Roadmap (as of 11 September 2009)". Wiki.mozilla.org. Retrieved 8 March 2011.
  43. ^ "Implement TLS Server Name Indication for servers". Bugzilla@Mozilla. 11 November 2006. Retrieved 30 October 2012.

External links