Le 5/14/13 11:35 AM, Jeff MAURY a écrit :
> On Tue, May 14, 2013 at 9:47 AM, Emmanuel Lécharny <elecha...@gmail.com>wrote:
>
>> Le 5/13/13 10:30 PM, Jeff MAURY a écrit :
>>> Hi,
>>>
>>> As I'm reading the TLS specs, I noticed that the processing of the close
>>> alarm, if not critical, may leave the underlaying transport connection
>>> (socket) open, probably to deal with STARTTLS behavior.
>> Yes.
>>
>>> So one option would be to had two new events: Secured (end of handshake)
>>> and Unsecured (Non critical Close alarm received).
>> We have flags in the session which can be set to tell if the session is
>> secured or not. Do we really need two events to be propagated to the
>> IoHandler ?
>>> Another pro is that in case of re-handshake, the application can now be
>>> notified.
>> That's a good use case.
>>
>>> By the way, do you know how the critical flag is given back by the
>>> SLLEngine ?
>> My understanding is that the close alert results in the SSLEngine to
>> change the SSLEngineResult status to CLOSED.
>>
> That was my understanding also but we've lost the critical flag. Should we
> delegate the responsability to the application if we have these new events
> ? My idea was that when we got the CLOSED from the SSLEngine we generate an
> Unsecured event and if the critical flag is set, we close the socket

The application might be interested in being informed about the switch
to secure/unsecure mode. So my +1 for the two events.

--
Regards,
Cordialement,
Emmanuel Lécharny
www.iktek.com


>


-- 
Regards,
Cordialement,
Emmanuel Lécharny
www.iktek.com 

Reply via email to