SNI support
See original GitHub issueIn my setup the HTTP transport always failed because of an untrusted certificate. The certificate, however, was trusted, but the server sent the wrong certificate as raven’s very own SSL wrapper apparently does not support TLS Server Name Indication. My guess is that this could be fixed by adding a server_hostname
attribute with useful content to the ssl.wrap_socket
call in raven.utils.http.urlopen.ValidHTTPSConnection
.
Issue Analytics
- State:
- Created 9 years ago
- Reactions:10
- Comments:12 (4 by maintainers)
Top Results From Across the Web
What is SNI? How TLS server name indication works
SNI, or Server Name Indication, is an extension for the TLS protocol to indicate a hostname in the TLS handshake. Learn more about...
Read more >Server Name Indication - Wikipedia
Server Name Indication (SNI) is an extension to the Transport Layer Security (TLS) computer networking protocol by which a client indicates which hostname ......
Read more >What is SNI (Server Name Indication)?
Server Name Indication (SNI) is an extension to the TLS protocol. It allows a client or browser to indicate which hostname it is...
Read more >Which browsers support Server Name Indication (SNI)?
Which browsers support SNI? Desktop browsers. Internet Explorer 7 starting with Windows Vista (not XP!) Google Chrome. 6+ on Windows XP and ...
Read more >Server Name Indication - The HTTPS-Only Standard
A website owner can require SNI support, either by allowing their host to do this for them, or by directly consolidating multiple hostnames...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
I thought this was kind of nightmare, having to write code for 10+ apps after switching to LetsEncrypt on the server; but then I noticed there is a pretty easy way to change the transport via the url. Just use
threaded+requests+https
as a url scheme!Also to add, if you can change your sentry server
nginx
settings, use something liketo force nginx route the non-SNI default website to sentry.