That does not look like valid httpd syntax.

If you can't use a SAN, then you need to configure all your vhosts as
IP:443, whereas one vhost uses a separate IP, and the remainder uses the
second IP.

On Wed, 18 May 2022 at 17:02, Paul Kudla (SCOM.CA Internet Services Inc.) <
p...@scom.ca> wrote:

>
> ok san is only useable if the cert is setup that way
>
> i bought a proper *.scom.ca wildcard ssl cert for my domain
>
> i then buy mail.xxx.com certs for the other domains
>
> sni works well when configured this way.
>
> granted san might or might not work (i never tries that) however san was
> designed more for apache web servers vs email etc
>
> san does allow adding domains but i more complicated to control what the
> cert is doing (or not)
>
> sound like what i did will work better for you situation
>
> example sni.conf file (import this at the end of your main dovecot.conf
> file
>
> using :
>
> #Addition ssl config
> !include sni.conf
>
> please note that below i wront a python script to pull the cert from a
> db table
>
> getssl.cert
>
> all it does it return the text for the ssl cert (key first then
> certificate then both Intermediate certs)
>
> you can point this to an ssl key file (the old way) formatted the same
>
> either will work
>
> note you need both the default cert setup AND the local name as well
>
> a *. signifies a wildcard ssl cert
>
> like *.scom.ca
>
> note you need to do something similiar in postfix as well for this to
> work across smtp + dovecot
>
>
>
>
> # cat sni.conf
> #sni.conf
> ssl = yes
> verbose_ssl = yes
> ssl_dh =</usr/local/etc/dovecot/dh-4096.pem
> ssl_prefer_server_ciphers = yes
> #ssl_min_protocol = TLSv1.2
>
> #Default *.scom.ca
> ssl_key =</usr/local/etc/dovecot/scom.pem
> ssl_cert =</usr/local/etc/dovecot/scom.pem
> ssl_ca =</usr/local/etc/dovecot/scom.pem
>
> local_name .scom.ca {
>    ssl_key = /programs/common/getssl.cert -c *.scom.ca -q yes
>    ssl_cert = /programs/common/getssl.cert -c *.scom.ca -q yes
>    ssl_ca = /programs/common/getssl.cert -c *.scom.ca -q yes
> }
>
>
> local_name mail.clancyca.com {
>    ssl_key = /programs/common/getssl.cert -c mail.clancyca.com -q yes
>    ssl_cert = /programs/common/getssl.cert -c mail.clancyca.com -q yes
>    ssl_ca = /programs/common/getssl.cert -c mail.clancyca.com -q yes
> }
>
> local_name secure.clancyca.com {
>    ssl_key = /programs/common/getssl.cert -c secure.clancyca.com -q yes
>    ssl_cert = /programs/common/getssl.cert -c secure.clancyca.com -q yes
>    ssl_ca = /programs/common/getssl.cert -c secure.clancyca.com -q yes
> }
>
> local_name mail.paulkudla.net {
>    ssl_key = /programs/common/getssl.cert -c mail.paulkudla.net -q yes
>    ssl_cert = /programs/common/getssl.cert -c mail.paulkudla.net -q yes
>    ssl_ca = /programs/common/getssl.cert -c mail.paulkudla.net -q yes
> }
>
> local_name mail.ekst.ca {
>    ssl_key = /programs/common/getssl.cert -c mail.ekst.ca -q yes
>    ssl_cert = /programs/common/getssl.cert -c mail.ekst.ca -q yes
>    ssl_ca = /programs/common/getssl.cert -c mail.ekst.ca -q yes
> }
>
> local_name mail.hamletdevelopments.ca {
>    ssl_key = /programs/common/getssl.cert -c mail.hamletdevelopments.ca
> -q yes
>    ssl_cert = /programs/common/getssl.cert -c mail.hamletdevelopments.ca
> -q yes
>    ssl_ca = /programs/common/getssl.cert -c mail.hamletdevelopments.ca
> -q yes
> }
>
>
>
>
> Happy Wednesday !!!
> Thanks - paul
>
> Paul Kudla
>
>
> Scom.ca Internet Services <http://www.scom.ca>
> 004-1009 Byron Street South
> Whitby, Ontario - Canada
> L1N 4S3
>
> Toronto 416.642.7266
> Main 1.866.411.7266
> Fax 1.888.892.7266
>
> On 5/18/2022 3:31 PM, Frank Gingras wrote:
> > See if you can add a SAN to that wildcard certificate first.
> >
> > On Wed, 18 May 2022 at 15:21, frank picabia <fpica...@gmail.com
> > <mailto:fpica...@gmail.com>> wrote:
> >
> >
> >     We have a server with over 300 vhosts on it.  Marketing/CMS madness
> >     I guess.
> >     All on the same domain name.  Many VirtualHosts are defined with
> *:443
> >     and then ServerName to rely on SNI.
> >     We have a wildcard cert for the domain and all the hosts use that.
> >
> >     Now there is a different domain to add for SSL.  For some reason
> >     the first domain name's certificate is being found.  I've put the
> >     IP for our new comer domain so we have <VirtualHost *MailScanner
> >     warning: numerical links are often malicious:* 1.1.1.1:443
> >     <http://1.1.1.1:443> >
> >     but it is still finding the other cert.  This IP is uniquely assigned
> >     with the different domain, as you'd expect with DNS.  So it can't
> >     be a overlap of the IP used elsewhere.
> >
> >     Researching this problem ("wrong cert loaded for vhost"),
> >     I read that in the initial SSL connection, it
> >     is talking to the IP, and whatever values we have for ServerName
> >     have no bearing until the page is being accessed.  If that's the case
> >     then it might have matched another vhost with *:443 first
> >     I tried putting my new domain at the top of ssl.conf but it made no
> >     difference.
> >
> >     I'm thinking I need to edit each *:443 case and change it to the
> >     appropriate IP.
> >     That will be a lot of work, so I'm looking for affirmation that is
> >     likely to make the difference.
> >
> >
> >
> > --
> > This message has been scanned for viruses and
> > dangerous content by *MailScanner* <http://www.mailscanner.info/>, and
> is
> > believed to be clean.
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
> For additional commands, e-mail: users-h...@httpd.apache.org
>
>

Reply via email to