DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=28151>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=28151 Proxy tunneling/auth with CONNECT for non-HTTP protocols ------- Additional Comments From [EMAIL PROTECTED] 2004-04-05 20:52 ------- Oleg and Mike B, Many thanks for getting an idea and a hack to a proper patch. To clarify all my ramblings about SocketFactories, here is line of code in HttpConnection.open() that concerned me: <code> final ProtocolSocketFactory socketFactory = (isSecure() && isProxied() ? new DefaultProtocolSocketFactory() : protocolInUse.getSocketFactory()); </code> I just wanted to be sure I could avoid the DefaultSocketFactory even if I use port 443. Looks like the solution is simply to always provide a non-Secure socketfactory so isSecure() evalutates to false. Then if I want SSL on top of the tunneled socket (and to avoid DefaultSocketFactory) I can simply wrap the returned socket myself in the same way as done in SSLProtocolSocketFactory. Cheers, /Mike S. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]