Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable TLS Server Name Indication #186

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open

Conversation

cernekee
Copy link

This enables TLS SNI. See also: bug #161 and crbug.com/400429

Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
In environments where SSL interception is in place, the SNI field is
often used to figure out whether to enable or disable interception
for a new connection.  Enable SNI on tlsdate requests.

More background info: http://crbug.com/400429

Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
@beaufortfrancois
Copy link

@ioerror gentle ping

@ioerror
Copy link
Owner

ioerror commented Apr 30, 2016 via email

akiernan pushed a commit to akiernan/tlsdate that referenced this pull request Jan 11, 2019
Upstream submission: ioerror#186

In environments where SSL interception is in place, the SNI field is
often used to figure out whether to enable or disable interception
for a new connection.  Enable SNI on tlsdate requests.

BUG=chromium:400429
TEST=sniff tlsdate's ClientHello message before/after the change, and
     verify that it contains "clients3.google.com" under "Extension:
     server_name"

Change-Id: Ibe6383bd0b9b590a16a08ae8e1b74ee0f401b3f0
Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/339834
Reviewed-by: Thiemo Nagel <tnagel@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>
akiernan pushed a commit to akiernan/tlsdate that referenced this pull request Jan 16, 2019
Upstream submission: ioerror#186

In environments where SSL interception is in place, the SNI field is
often used to figure out whether to enable or disable interception
for a new connection.  Enable SNI on tlsdate requests.

BUG=chromium:400429
TEST=sniff tlsdate's ClientHello message before/after the change, and
     verify that it contains "clients3.google.com" under "Extension:
     server_name"

Change-Id: Ibe6383bd0b9b590a16a08ae8e1b74ee0f401b3f0
Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/339834
Reviewed-by: Thiemo Nagel <tnagel@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>
akiernan pushed a commit to akiernan/tlsdate that referenced this pull request Jan 16, 2019
Upstream submission: ioerror#186

In environments where SSL interception is in place, the SNI field is
often used to figure out whether to enable or disable interception
for a new connection.  Enable SNI on tlsdate requests.

BUG=chromium:400429
TEST=sniff tlsdate's ClientHello message before/after the change, and
     verify that it contains "clients3.google.com" under "Extension:
     server_name"

Change-Id: Ibe6383bd0b9b590a16a08ae8e1b74ee0f401b3f0
Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/339834
Reviewed-by: Thiemo Nagel <tnagel@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>
akiernan pushed a commit to akiernan/tlsdate that referenced this pull request Jan 16, 2019
Upstream submission: ioerror#186

In environments where SSL interception is in place, the SNI field is
often used to figure out whether to enable or disable interception
for a new connection.  Enable SNI on tlsdate requests.

BUG=chromium:400429
TEST=sniff tlsdate's ClientHello message before/after the change, and
     verify that it contains "clients3.google.com" under "Extension:
     server_name"

Change-Id: Ibe6383bd0b9b590a16a08ae8e1b74ee0f401b3f0
Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/339834
Reviewed-by: Thiemo Nagel <tnagel@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>
akiernan pushed a commit to akiernan/tlsdate that referenced this pull request Jan 16, 2019
Upstream submission: ioerror#186

In environments where SSL interception is in place, the SNI field is
often used to figure out whether to enable or disable interception
for a new connection.  Enable SNI on tlsdate requests.

BUG=chromium:400429
TEST=sniff tlsdate's ClientHello message before/after the change, and
     verify that it contains "clients3.google.com" under "Extension:
     server_name"

Change-Id: Ibe6383bd0b9b590a16a08ae8e1b74ee0f401b3f0
Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/339834
Reviewed-by: Thiemo Nagel <tnagel@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>
akiernan pushed a commit to akiernan/tlsdate that referenced this pull request Feb 26, 2019
Upstream submission: ioerror#186

In environments where SSL interception is in place, the SNI field is
often used to figure out whether to enable or disable interception
for a new connection.  Enable SNI on tlsdate requests.

BUG=chromium:400429
TEST=sniff tlsdate's ClientHello message before/after the change, and
     verify that it contains "clients3.google.com" under "Extension:
     server_name"

Change-Id: Ibe6383bd0b9b590a16a08ae8e1b74ee0f401b3f0
Signed-off-by: Kevin Cernekee <cernekee@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/339834
Reviewed-by: Thiemo Nagel <tnagel@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants