[X] No, because ... ... I'm paranoid:
https://issues.apache.org/jira/browse/PROTON-717 https://issues.apache.org/jira/browse/PROTON-716 While there's no (known) POODLE-like exploit involving AMQP (POODLE attacks browsers to decrypt cookies), now that a vulnerability is known we should avoid this protocol in case some e_N_terpri_S_ing p_A_rty takes up the challenge. -K ----- Original Message ----- > From: "Rafael Schloming" <r...@alum.mit.edu> > To: proton@qpid.apache.org > Sent: Wednesday, October 15, 2014 12:46:25 PM > Subject: VOTE: Release Proton 0.8 RC3 as 0.8 final > > Hi Everyone, > > As usual the call for a formal vote flushed out a few last minute issues, > so here is a quick respin with the following items fixed. > > - PROTON-708 > - PROTON-711 (fixed for Java6) > - PROTON-712 > - PROTON-714 > - PROTON-715 > > The sources can be found at the usual location: > > http://people.apache.org/~rhs/qpid-proton-0.8rc3/ > > Java binaries are here: > > https://repository.apache.org/content/repositories/orgapacheqpid-1018 > > Please check them out and register your vote: > > [ ] Yes, release Proton 0.8 RC3 as 0.8 final > > --Rafael > -- -K