[ 
https://issues.apache.org/jira/browse/QPID-3514?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13121323#comment-13121323
 ] 

[email protected] commented on QPID-3514:
-----------------------------------------------------



bq.  On 2011-10-05 15:39:54, Andrew Stitcher wrote:
bq.  > ** We can't accept this as it stands as it will break IPv6 support if 
turned on. **
bq.  > 
bq.  > On the whole I think it is moving in the correct direction, but it is 
only partly formed:
bq.  > 
bq.  > * This works in effect by adding in *another* transport type - the muxed 
SSL transport. We are trying to reduce and simplify the number of transports 
not increase them, this will make the code harder to maintain over all.
bq.  > 
bq.  > * It's not clear to me why we wouldn't want this always turned on if we 
have the capability. In other words what is the benefit of ever turning it off. 
When we can do this switch then we should have it on for all listening sockets, 
the only option should be to allow a port to only accept encrypted connections.
bq.  > 
bq.  > * This code is tactical, not strategic in that it works for this 
particular case, but as far as I can tell won't help in the upcoming amqp 1.0 
case where we would need to switch to TLS processing sometime during the amqp 
protocol processing.
bq.  > 
bq.  > * The code that selects between encrypted and non encrypted code paths 
should be unified with the code that checks the protocol version, currently the 
accept code does this and blocks whilst reading some bytes from the connection. 
I really don't like this approach.
bq.  > 
bq.  > - Actually this code makes me wonder if we should change the 
architecture of the socket code to have an explicit piece of code which is run 
just after accepting a socket to select which bits of code get run next.
bq.  >
bq.  
bq.  Gordon Sim wrote:
bq.      Is IPv6 supported for SSL at present? If not, and if you view this as 
adding the (optional) ability to serve plain sockets on the SSL enabled port, 
then one could argue its not really a regression. We would need to add IPv6 
support to SSL anyway and it would seem to be to be largely independent of this 
change. If however we do support IPv6 on SSL and this breaks it then I would 
certainly agree with you.
bq.      
bq.      While I think its fair to characterise this as tactical, I don't think 
it makes a strategic solution any harder. Though it adds an additional protocol 
factory it re-uses code very well (better indeed than what is there at 
present). It would certainly need modifications for AMQP 1.0, but compared to 
the rest of the work required there I don't think that is particularly 
significant, nor do I think it makes things any worse.
bq.      
bq.      The strategic changes around this part of the code are more 
fundamental. Until there is something concrete planned there I think it would 
be a real shame to bar adding useful new features, providing they don't 
aggravate the situation (and I would argue this patch does not).
bq.      
bq.      Your point around the blocking in the accept is a good one. It would 
be much nicer to avoid blocking if possible. Given the dearth of documentation 
in this area, would you be willing to flesh out your preferred approach in a 
bit more detail?
bq.
bq.  
bq.  Andrew Stitcher wrote:
bq.      I disagree in principle with the idea that adding more code when we 
really need to simplify the code doesn't make our job going forward any harder.
bq.      
bq.      The code in this area is just within my ability to comprehend, adding 
more just makes it harder for me. So while this is a reasonably neat tactical 
job I strongly suggest that including this code before simplifying what already 
there will make it harder to simplify, I know it will make it harder for me to 
simplify.

As a note my plan for making SSL run over IPv6 does indeed feature some of the 
simplification I'm talking about, specifically I'm introducing a Socket 
interface implemented by both SSL and regular TCP sockets so that the higher 
level code can be reduced to a single implementation.

This approach also allows for handing over a socket to the SSL code from the 
TCP code during the negotiation if required.

So overall my approach to this would be opposite make the TCP code detect SSL 
connections and create the SSL wiring, rather than have a specific option to 
make the SSL code allow for regular TCP connections.


- Andrew


-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/2206/#review2342
-----------------------------------------------------------


On 2011-10-05 13:36:58, Gordon Sim wrote:
bq.  
bq.  -----------------------------------------------------------
bq.  This is an automatically generated e-mail. To reply, visit:
bq.  https://reviews.apache.org/r/2206/
bq.  -----------------------------------------------------------
bq.  
bq.  (Updated 2011-10-05 13:36:58)
bq.  
bq.  
bq.  Review request for Andrew Stitcher, michael goulish, Ted Ross, and Chug 
Rolke.
bq.  
bq.  
bq.  Summary
bq.  -------
bq.  
bq.  Allow SSL and non-SSL connections on the same port. Patch contributed by 
Zane Bitter for use by the Matahari Project.
bq.  
bq.  
bq.  This addresses bug QPID-3514.
bq.      https://issues.apache.org/jira/browse/QPID-3514
bq.  
bq.  
bq.  Diffs
bq.  -----
bq.  
bq.    /trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp 1179157 
bq.    /trunk/qpid/cpp/src/qpid/sys/ssl/SslIo.cpp 1179157 
bq.    /trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.h 1179157 
bq.    /trunk/qpid/cpp/src/qpid/sys/ssl/SslIo.h 1179157 
bq.    /trunk/qpid/cpp/src/qpid/sys/TCPIOPlugin.cpp 1179157 
bq.    /trunk/qpid/cpp/src/qpid/sys/Socket.h 1179157 
bq.    /trunk/qpid/cpp/src/qpid/sys/SslPlugin.cpp 1179157 
bq.  
bq.  Diff: https://reviews.apache.org/r/2206/diff
bq.  
bq.  
bq.  Testing
bq.  -------
bq.  
bq.  make check passes; tested with and without the multiplexing; tested client 
authentication; tested SASL EXTERNAL (requires reverting a recent change 
unrelated to this, see QPID-3522)
bq.  
bq.  
bq.  Thanks,
bq.  
bq.  Gordon
bq.  
bq.


                
> Allow SSL and non-SSL connections on the same port
> --------------------------------------------------
>
>                 Key: QPID-3514
>                 URL: https://issues.apache.org/jira/browse/QPID-3514
>             Project: Qpid
>          Issue Type: Improvement
>          Components: C++ Broker
>    Affects Versions: 0.12
>            Reporter: Zane Bitter
>         Attachments: ssl-mux.patch
>
>
> The Matahari Project (http:://matahariproject.org for the uninitiated) has 
> run into an issue with our use of Qpid in that IANA policy is now to refuse 
> to assign separate TCP ports for SSL/TLS-wrapped versions of protocols, which 
> leaves us with only a single port assigned to Matahari.
> We would like to be able to accept both SSL and non-SSL connections on the 
> same port.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

---------------------------------------------------------------------
Apache Qpid - AMQP Messaging Implementation
Project:      http://qpid.apache.org
Use/Interact: mailto:[email protected]

Reply via email to