Short description
For Windows Server 2012: Is there a way to define a default-certificate in case the client does not support SNI?
Long description
We are currently configuring a Windows Server 2012 that - for technical reasons - does only have a single IP. This server is used for two tasks:
- SSTP-Host (vpn.example.com)
- Host for a single TLS-Website (www.example.com)
Thus there are two certificates defined for the same IP-address and port. When a call is made to port 443, almost every client submits the SNI parameter "server_name". The server does then use this parameter in order to choose the correct certificate for the connection.
BUT: Windows XP with Internet Explorer does not support SNI and the parameter "server_name" is missing. Thus the server has to make a guess, which certificate to return. In our case, it defaults to the vpn-certificate and the browser displays a certificate-error (since the certificate's hostname "vpn.example.com" does not match the hostname in the url "www.example.com").
Is there a way to advise the server to use the www-certificate instead as a default?
This would be a perfect solution in our case:
- All www-requests would get the www-certificate, even if they do not support SNI.
- All SSTP-requests would get the vpn-certificate, since they do all support SNI.
Can this be done?