[X] No, because ...
... I'm paranoid:
https://issues.apache.org/jira/browse/PROTON-717
https://issues.apache.org/jira/browse/PROTON-716
While there's no (known) POODLE-like exploit involving AMQP (POODLE attacks
browsers to decrypt cookies), now that a vulnerability is known we should avoid
this protocol in case some e_N_terpri_S_ing p_A_rty takes up the challenge.
-K
- Original Message -
> From: "Rafael Schloming"
> To: proton@qpid.apache.org
> Sent: Wednesday, October 15, 2014 12:46:25 PM
> Subject: VOTE: Release Proton 0.8 RC3 as 0.8 final
>
> Hi Everyone,
>
> As usual the call for a formal vote flushed out a few last minute issues,
> so here is a quick respin with the following items fixed.
>
> - PROTON-708
> - PROTON-711 (fixed for Java6)
> - PROTON-712
> - PROTON-714
> - PROTON-715
>
> The sources can be found at the usual location:
>
> http://people.apache.org/~rhs/qpid-proton-0.8rc3/
>
> Java binaries are here:
>
> https://repository.apache.org/content/repositories/orgapacheqpid-1018
>
> Please check them out and register your vote:
>
> [ ] Yes, release Proton 0.8 RC3 as 0.8 final
>
> --Rafael
>
--
-K