SSL Reject Handshake for unknown Host #7232
-
SummaryIs there feature or configuration that I can use to block ssl handshake when the client does not present proper hostname I did readup nginx has this feature call ssl_reject_handshake that can be toggled http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_reject_handshake |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments
-
I think we would need more information on what is to be considered |
Beta Was this translation helpful? Give feedback.
-
Hi @bungle Thanks for your reply Reason i would think this option will be helpful is because currently there is no clear separation between IP-based and host name-based virtual servers. When client call kong endpoint with IP, currently it is not blocking, ssl handshake will be established, although with some configuration below, I managed to block the traffic by returning HTTP error code if we can have the directive for
|
Beta Was this translation helpful? Give feedback.
-
@kelvinwijaya You might be able to use Nginx directive injection for this use-case. For example, assuming you want to inject that directive into the Proxy server block, you could use |
Beta Was this translation helpful? Give feedback.
@kelvinwijaya You might be able to use Nginx directive injection for this use-case. For example, assuming you want to inject that directive into the Proxy server block, you could use
nginx_proxy_ssl_reject_handshake=on
.