|
Please wait while updating issue type...
Could not save your changes
This issue has been changed since you started editing it
Data that has been changed is highlighted in red below. Undo your changes to see the updated information
You have changed this issue, but haven't saved your changes yet. To save it, press the Save changes button to the right
This issue is blocking the next release
There are no comments
There is nothing attached to this issue
This issue has no duplicates
There are no code checkins for this issue |
|||||||||||||||||||||||||||||
Really delete this comment?
Really delete this comment?
Really delete this comment?
Really delete this comment?
Really delete this comment?
- Acceptor server accepts an incoming connection
- if accepted from an SSL port, initiate SSL handshake
- read the connection type identifyer
- dispatch the channel to the server determined by the identifier
Instead, what we need is more like this:- Acceptor server accepts an incoming connection
- read the connection type identifyer
- dispatch the channel to the server determined by the identifier
- corresponding server initiates SSL handshake, using SSL parameters (including the trust store) for the type of channel: client or non-client
What this means is we need to identify the channel before the SSL handshake takes place. It also means that remote peers (nodes, clients and other servers) will have to send the connection identifier before the SSL handshake.Really delete this comment?
The issue was updated with the following change(s):
Really delete this comment?