[X] No, because ...

... I'm paranoid:


https://issues.apache.org/jira/browse/PROTON-717
https://issues.apache.org/jira/browse/PROTON-716

While there's no (known) POODLE-like exploit involving AMQP (POODLE attacks 
browsers to decrypt cookies), now that a vulnerability is known we should avoid 
this protocol in case some e_N_terpri_S_ing p_A_rty takes up the challenge.

-K 


----- Original Message -----
> From: "Rafael Schloming" <r...@alum.mit.edu>
> To: proton@qpid.apache.org
> Sent: Wednesday, October 15, 2014 12:46:25 PM
> Subject: VOTE: Release Proton 0.8 RC3 as 0.8 final
> 
> Hi Everyone,
> 
> As usual the call for a formal vote flushed out a few last minute issues,
> so here is a quick respin with the following items fixed.
> 
>   - PROTON-708
>   - PROTON-711 (fixed for Java6)
>   - PROTON-712
>   - PROTON-714
>   - PROTON-715
> 
> The sources can be found at the usual location:
> 
>     http://people.apache.org/~rhs/qpid-proton-0.8rc3/
> 
> Java binaries are here:
> 
>     https://repository.apache.org/content/repositories/orgapacheqpid-1018
> 
> Please check them out and register your vote:
> 
> [   ] Yes, release Proton 0.8 RC3 as 0.8 final

> 
> --Rafael
> 

-- 
-K

Reply via email to