[Cyberduck-trac] [Cyberduck] #7831: SNI support in the non-App Store version
Cyberduck
trac at trac.cyberduck.io
Mon Mar 3 18:50:25 UTC 2014
#7831: SNI support in the non-App Store version
---------------------------+-------------------------
Reporter: sergei | Owner: dkocher
Type: defect | Status: reopened
Priority: normal | Milestone: 4.4.4
Component: webdav | Version: 4.4.3
Severity: normal | Resolution:
Keywords: | Architecture: Intel
Platform: Mac OS X 10.9 |
---------------------------+-------------------------
Changes (by sergei):
* status: closed => reopened
* resolution: worksforme =>
Old description:
> This issue is related to discussion in google group
> [https://groups.google.com/forum/#!topic/cyberduck/to2dymHbxOo] thread.
>
> It appears that cyberduck does pass server name to the server when it
> establishes SSL connection.
>
> To reproduce an issue go open attached bookmark file.
>
> The following openssl command line demonstrates that sever is properly
> configured:
>
> {{{
> openssl s_client -servername cyberduck.coobserver.com -connect
> cyberduck.coobserver.com:443
> }}}
>
> Certificate CN name is cyberduck.coobserver.com
>
> If server name option is omitted then:
>
> {{{
> openssl s_client -connect cyberduck.coobserver.com:443
> }}}
>
> then server sends certificate with CN=dav.lianajoykids.com
>
> Cyberduck warns that certificate does not match server name. This means
> that cyberduck failed to send server name in SSL handshake.
>
> The demo site is empty and configured to resolve just this issue.
>
> Please send me email to sergeig at me dot com for password to access the
> website.
New description:
Update:
The issue can be reproduced only on Mac OS X. My OS X Machine is on
current patched Maverics 10.9.1. The terminal reports:
java version "1.6.0_65"
Java(TM) SE Runtime Environment (build 1.6.0_65-b14-462-11M4609)
Java HotSpot(TM) 64-Bit Server VM (build 20.65-b04-462, mixed mode)
Windows release of cyberduck is not affected. I was able to verify it on 2
separate windows boxes.
The certificate is issued by private CA. However, testing on windows did
not result in any warnings that certificate is not trusted (even on the
machine that does not trust private root CA).
Original Description:
This issue is related to discussion in google group
[https://groups.google.com/forum/#!topic/cyberduck/to2dymHbxOo] thread.
It appears that cyberduck does pass server name to the server when it
establishes SSL connection.
To reproduce an issue go open attached bookmark file.
The following openssl command line demonstrates that sever is properly
configured:
{{{
openssl s_client -servername cyberduck.coobserver.com -connect
cyberduck.coobserver.com:443
}}}
Certificate CN name is cyberduck.coobserver.com
If server name option is omitted then:
{{{
openssl s_client -connect cyberduck.coobserver.com:443
}}}
then server sends certificate with CN=dav.lianajoykids.com
Cyberduck warns that certificate does not match server name. This means
that cyberduck failed to send server name in SSL handshake.
The demo site is empty and configured to resolve just this issue.
Please send me email to sergeig at me dot com for password to access the
website.
--
--
Ticket URL: <https://trac.cyberduck.io/ticket/7831#comment:5>
Cyberduck <http://cyberduck.io>
Libre FTP, SFTP, WebDAV, S3 & OpenStack Swift browser for Mac and Windows
More information about the Cyberduck-trac
mailing list