DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=28151>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=28151

Proxy tunneling/auth with CONNECT for non-HTTP protocols





------- Additional Comments From [EMAIL PROTECTED]  2004-04-05 20:52 -------
Oleg and Mike B,

Many thanks for getting an idea and a hack to a proper patch.

To clarify all my ramblings about SocketFactories, here is line of code in 
HttpConnection.open() that concerned me:

<code>
final ProtocolSocketFactory socketFactory =
                    (isSecure() && isProxied()
                            ? new DefaultProtocolSocketFactory()
                            : protocolInUse.getSocketFactory());

</code>

I just wanted to be sure I could avoid the DefaultSocketFactory even if I use 
port 443.  Looks like the solution is simply to always provide a non-Secure 
socketfactory so isSecure() evalutates to false.  Then if I want SSL on top of 
the tunneled socket (and to avoid DefaultSocketFactory) I can simply wrap the 
returned socket myself in the same way as done in SSLProtocolSocketFactory. 

Cheers,

/Mike S.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to