https://wiki.apache.org/httpd/NameBasedSSLVHostsWithSNI gives a nicer summary than the original documentation:
---cut
Changes in configuration to use SNI
There is one new directive related to using SNI with name-based virtual hosts, SSLStrictSNIVHostCheck, which controls whether to allow non SNI clients to access a name-based virtual host.
The first (default) vhost for SSL name-based virtual hosts must include TLSv1 as a permitted protocol, otherwise Apache will not accept the SNI information from the client and it will be as if the client did not support SNI at all.
Since the first (default) vhost will be used for any request where the provided server name doesn't match another vhost, it is important that the first vhost have the most restrictive access control, otherwise clients can access restricted resources by sending a request for any unknown hostname. (This isn't actually any different from using virtual hosts without SSL.)
---cut
Read:
- Apache httpd uses the first virtualhost to configure some protocol-level options. If the first virtualhost doesn't permit TLSv1, no other virtualhost can implement SNI.
- If SSLStrictSNIVHostCheck does permit connections from clients without SNI, those connections will be handled by the first TLS-configured virtualhost. The connection will use the certificate configured for the first virtualhost (which may raise a warning within the user's browser) and deliver any website content configured within this virtualhost.
In order not to bypass any other restrictions configured for other virtualhosts, the content served from this virtualhost should be restricted (e.g. rather a simple error page "your browser doesn't do SNI" than a browsable directory tree with any other document roots). This behaviour is the same for namebased HTTP.
The reasoning to drop HTTPS support isn't clear for me as well: as the last quoted wiki-sentence in brackets stated, Apache httpd does behave the same way for namebased HTTP hosting. The only difference: namebased HTTP hosting has been actively used for about 16 years now, while most TLS/SSL-hosting has been done on "dedicated" IPs and SNI just started spreading within the very last years.
Best,
Anders