Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 56425 invoked from network); 6 Mar 2006 08:55:18 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 6 Mar 2006 08:55:18 -0000 Received: (qmail 24444 invoked by uid 500); 6 Mar 2006 08:55:59 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 24066 invoked by uid 500); 6 Mar 2006 08:55:57 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 24055 invoked by uid 99); 6 Mar 2006 08:55:57 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 06 Mar 2006 00:55:57 -0800 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: pass (asf.osuosl.org: local policy) Received: from [195.233.129.142] (HELO rat01037.dc-ratingen.de) (195.233.129.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 06 Mar 2006 00:55:53 -0800 Received: from rat01047.dc-ratingen.de (rat01047_e0 [195.233.128.119]) by rat01037.dc-ratingen.de (Switch-3.1.4/Switch-3.1.0) with ESMTP id k268tVR1026758 for ; Mon, 6 Mar 2006 09:55:31 +0100 (MET) Received: from vis01-mx02.vis.internal.vodafone.com (vis01-mx02.dc-ratingen.de [145.230.71.230]) by rat01047.dc-ratingen.de (Switch-3.1.4/Switch-3.1.0) with ESMTP id k268tVfp009708 for ; Mon, 6 Mar 2006 09:55:31 +0100 (MET) X-MimeOLE: Produced By Microsoft Exchange V6.5 Content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Subject: AW: SSL enabled name virtual hosts Date: Mon, 6 Mar 2006 09:55:29 +0100 Message-ID: X-MS-Has-Attach: X-MS-TNEF-Correlator: Thread-Topic: SSL enabled name virtual hosts Thread-Index: AcZA8pRPX5Vq85uaQbm/kKeL9X6LBgACLJ9Q From: =?iso-8859-1?Q?Pl=FCm=2C_R=FCdiger=2C_VIS?= To: X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N > -----Urspr=FCngliche Nachricht----- > Von: William A. Rowe, Jr.=20 > Stop bitching about a 10 year old spec. It's trivial, use a=20 > modern browser (beyond today - none exist yet) that can do=20 > Connection-Upgrade and agree about the text of the headers=20 > before the ssl handshake is performed. The browser people=20 > haven't caught up, because it's a non-trivial problem to=20 > represent that the agreed-upon connection is secure to the=20 > user, or that a secure connection is available to be toggled,=20 > or whatever. These aren't https:// requests, they are=20 > http:// with extra semantics. Modern clients such as remote=20 > printing over http and neon/curl libraries already support it=20 > now, IIUC. As does httpd 2.2. Or wait for RFC3546 (ftp://ftp.rfc-editor.org/in-notes/rfc3546.txt) be implemented in the browsers and servers. IE 7 beta is said to support it and upcoming openssl 0.9.9 is likely to support it. After that we can start implementing in httpd. Regards R=FCdiger