[ 
https://issues.apache.org/jira/browse/DIRSERVER-1373?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12716855#action_12716855
 ] 

Kiran Ayyagari commented on DIRSERVER-1373:
-------------------------------------------

>> What happens to established SSL or StartTLS sessions when calling 
>> reloadSslContext? Are they killed or do they continue to use the old 
>> certificate?

Atm, the connections' are not blocked from reading and writing. I think we can 
achieve it by suspending read/write on all the sessions. Emmanuel, is this the 
right way to do from a MINA pov?

But another question is that what happens to an already existing SSL 
connection? wouldn't it fail because of the new certificate?

>> to reload the SSL context automatically when the certificate of 
>> uid=admin,ou=system gets updated

No clue at the moment how to do this in an efficient way, certainly any check 
put up in the interceptor would be a over kill IMHO.


> Update of server certificate in uid=admin,ou=system only takes effect after 
> restart
> -----------------------------------------------------------------------------------
>
>                 Key: DIRSERVER-1373
>                 URL: https://issues.apache.org/jira/browse/DIRSERVER-1373
>             Project: Directory ApacheDS
>          Issue Type: Bug
>          Components: ldap
>    Affects Versions: 1.5.4
>            Reporter: Stefan Seelmann
>             Fix For: 1.5.5
>
>         Attachments: DIRSERVER-1373-testcases-UPDATED.patch, 
> DIRSEVER-1373-Testcases.patch
>
>
> When I update the privateKey, publicKey and userCertificate in 
> uid=admin,ou=system and start a new StartTLS session, the server still uses 
> the old certificate. After a restart the server uses the new certificate.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to