Server Name Indication

Published by Tobias Hofmann on

6 min read

SNI is an extension to TLS and enables HTTPS clients to send the host name of the server it wants to connect to at the start of the handshake request. This is an important feature, as the host name information is sent inside the HTTP header and the header is only sent after the handshake (TLS connection already established).

With SNI, the server host to which the client wants to connect to is send outside the HTTP header. When the connection is established, the server reads the server name from the SNI extension field and knows the server name the client wants to connect to. This is very important in the cloud world, as many services are running behind a reverse proxy. That is, a server in front of them handles the incoming requests, establishes a secure connection and then forwards the client requests to the correct backend. In case your client does not support SNI, you do have a serious problem connecting securely to cloud services.

Without SNI, when the TLS connection is established, the HTTPS server does not know to which host name (FQDN) the client wants to connect to: the default TLS certificate of the server is sent. If the client wants to connect to, and this is a virtual host, and the server’s default host is, the certificate for will be send.

Working example

The below image should help you to understand the flow and how a web server selects the correct data to send back. A client connects to host The FQDN of the server is send as a value in the HTTP header. As the client supports SNI, the same information is send in the TLS SNI extension during the handshake process. The server selects the TLS certificate for thanks to SNI, and then loads the data from the virtual host as indicated in the HTTP header.

You can test this using the sample services. When you access

The browser sends the server in the HTTP header field host. This field is used by the web server to evaluate by which virtual server the request is handled.

Ein Bild, das Text enthält.

Automatisch generierte Beschreibung

Using the value in the host header, the web server knows which data to send, including the correct TLS certificate.

Low level

If you want to know how this works in reality and how SNI looks like, Wireshark can be used to capture the TLS connection flow. Client Hello is sent when the client initiates the TLS connection.

Ein Bild, das Tisch enthält.

Automatisch generierte Beschreibung

When the browser sends Client Hello, SNI with the host name is included in the request. As SNI is a TLS extension, it appears in the list of TLS extensions. The data is still unencrypted.

Ein Bild, das Text enthält.

Automatisch generierte Beschreibung

The server is sending its certificate in Server Hello, which is a response to Client Hello.

Ein Bild, das Text enthält.

Automatisch generierte Beschreibung

This shows clearly why with SNI the client can send the server host information and why the web server can read the value and respond with the correct server TLS certificate.

Erroneous example

In case the host header and SNI are not pointing to an existing virtual host, the default configuration of the web server is used. You can easily simulate this by accessing the web server via IP address. The web server behind is running on IP If you open that page in your browser:

The SNI information is empty, therefore the server will respond with its own certificate. Also, as no virtual host is found, it’s a web page saying that it could not find the correct web page.

Ein Bild, das Text enthält.

Automatisch generierte Beschreibung

Note that the connection is still using TLS and the default server certificate was used: default TLS certificate is issued for

Ein Bild, das Text enthält.

Automatisch generierte Beschreibung

Why this certificate is sent instead of the one for Let’s take a look at the above graphic and use it to follow the red line indicating the information flow. The browser is not sending a valid virtual host in the HTTP header field (IP address). The web server therefore cannot identify a valid virtual host and is using its default configuration. Which is to use the information and certificate of the web server itself. Instead of accessing the virtual host, the browser is accessing and the server certificate is for * Of course, this is not a valid communication with TLS.

The same happens when a client is not supporting SNI. The HTTP header information is sent after the TLS handshake, which means the information is sent after establishing a trusted connection. When the server cannot read the host field, the default configuration of the web server is used. Result: default server certificate is send. As the browser expects a certificate issued to a different server name, the browser will not accept the TLS session. For the browser the TLS connection is faulty. It looks like a hacking attempt. Without SNI, you can only connect to web servers that do not depend on a virtual host configuration.

Let the world know

Tobias Hofmann

Doing stuff with SAP since 1998. Open, web, UX, cloud. I am not a Basis guy, but very knowledgeable about Basis stuff, as it's the foundation of everything I do (DevOps). Performance is king, and unit tests is something I actually do. Developing HTML5 apps when HTML5 wasn't around. HCP/SCP user since 2012, NetWeaver since 2002, ABAP since 1998.


Maria · April 22, 2022 at 10:19

Thank you so much, very useful information 🙂

SAP NetWeaver is not cloud ready | It's full of stars! · December 22, 2020 at 10:00

[…] Why is NetWeaver not cloud ready? Because SNI is disabled by default. In case you are wondering what SNI is and why it is important for cloud scenarios let’s try to explain how the cloud works and in which scenario NetWeaver fails to work together with it. For general information on SNI, please read my blog. […]

SAP NetWeaver SNI configuration | It's full of stars! · December 23, 2020 at 09:30

[…] my NetWeaver ABAP system to a public OData service. You can read my blogs for more information on SNI in general and SNI with NetWeaver […]

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.