Possibly.  I would need to look at when the ALPN negotiation happens.
However, the protocol options on the SSL object seems to get sticky really
fast, so I wouldn't hold my breath.

On Wed, Jan 16, 2019 at 7:56 PM Leif Hedstrom <zw...@apache.org> wrote:

>
>
> > On Jan 16, 2019, at 4:33 PM, Susan Hinrichs <shinr...@apache.org> wrote:
> >
> > I know that I had a discussion on this with Miles and Alan, but I can
> find
> > no written record.  The desire is on a per domain (SNI) basis alter the
> set
> > of TLS protocols that ATS is willing to accept.
> >
> > I put up a PR with an addition to ssl_server_name.yaml to do this.  There
> > is documentation in the PR and an example in the autest.
> >
> > One caveat is this only works in openssl 1.1.1 or better.  We need very
> > early callback to alter how the SSL structure is interpreted.  openssl
> > 1.1.1 adds a client_hello callback which does the trick.
> >
> > https://github.com/apache/trafficserver/pull/4815
> >
> > Comments on the PR appreciated.
>
>
> Cool!
>
> Can this (later) be generalized to also allow ALPN negotiations to dictate
> protocol features? For example, HTTP/2 dictates that only TLS v1.2 or later
> is to be used, something that we (ATS) do not enforce at this point? At
> least I don’t think we do? There’s also a long blacklist of cipher suites
> for HTTP/2.
>
> Cheers,
>
> — Leif
>
>

Reply via email to