From 4d02d0e877e24b1dc94948c236462417bdd9bbf0 Mon Sep 17 00:00:00 2001 From: Gancho Tenev Date: Fri, 29 Jul 2016 16:39:44 -0700 Subject: [PATCH] TS-4706 Truncated SNI name during escalation SSL hostname verification failing due to truncated SNI name. --- proxy/http/HttpSM.cc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/proxy/http/HttpSM.cc b/proxy/http/HttpSM.cc index 12c5da84d2f..3c19cf73db6 100644 --- a/proxy/http/HttpSM.cc +++ b/proxy/http/HttpSM.cc @@ -7796,6 +7796,7 @@ HttpSM::redirect_request(const char *redirect_url, const int redirect_len) t_state.hdr_info.client_request.value_set(MIME_FIELD_HOST, MIME_LEN_HOST, host, host_len); } t_state.hdr_info.client_request.m_target_cached = false; + t_state.hdr_info.server_request.m_target_cached = false; } else { // the client request didn't have a host, so use the current origin host if (valid_origHost) { @@ -7834,6 +7835,7 @@ HttpSM::redirect_request(const char *redirect_url, const int redirect_len) url_nuke_proxy_stuff(t_state.hdr_info.client_request.m_url_cached.m_url_impl); t_state.hdr_info.client_request.method_set(origMethod, origMethod_len); t_state.hdr_info.client_request.m_target_cached = false; + t_state.hdr_info.server_request.m_target_cached = false; clientUrl.scheme_set(scheme_str, scheme_len); } else { LhostError: