Just for info, I have now updated the default behaviour of the keystore to
always return a valid certificate (if one is available), and to use (if
available) the host name information in the client's connection to pick a
certificate which matches the expected address (work done under QPID-7567).

-- Rob

On 27 October 2017 at 16:12, Vavricka <vavricka.to...@gmail.com> wrote:

> rgodfrey wrote
> > On 27 October 2017 at 10:43, Vavricka &lt;
>
> > vavricka.tomas@
>
> > &gt; wrote:
> >
> > In the period 28.10.2017 10:00 - 30.10.2017 10:00; both certificates are
> > valid... the broker can't really know which is "preferred" by the client,
> > I
> > would think that we should always go with the one with the most distant
> > expiry simply to avoid issues where we are getting very close to the
> > expiry
> > time of the older certificate (i.e. if we are within a minute, then you
> > run
> > the risk of clock drift between the client and server causing the served
> > certificate to appear invalid.  Is this your expectation too?
> >
> > -- Rob
>
> I misunderstood how SSL handshake works. Because server offers certificate
> first, server can't know what certificate client have.
>
> Case 2. is now irrelevant and I expect same Java broker behavior as today.
>
> Thanks for explanation.
>
> Vavricka
>
>
>
> --
> Sent from: http://qpid.2158936.n2.nabble.com/Apache-Qpid-users-
> f2158936.html
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@qpid.apache.org
> For additional commands, e-mail: users-h...@qpid.apache.org
>
>

Reply via email to