Return-Path: Delivered-To: apmail-tomcat-dev-archive@www.apache.org Received: (qmail 40895 invoked from network); 28 Jan 2008 14:42:56 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 28 Jan 2008 14:42:56 -0000 Received: (qmail 61464 invoked by uid 500); 28 Jan 2008 14:42:44 -0000 Delivered-To: apmail-tomcat-dev-archive@tomcat.apache.org Received: (qmail 61403 invoked by uid 500); 28 Jan 2008 14:42:44 -0000 Mailing-List: contact dev-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Developers List" Delivered-To: mailing list dev@tomcat.apache.org Received: (qmail 61384 invoked by uid 500); 28 Jan 2008 14:42:44 -0000 Delivered-To: apmail-jakarta-tomcat-dev@jakarta.apache.org Received: (qmail 61379 invoked by uid 99); 28 Jan 2008 14:42:44 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 28 Jan 2008 06:42:44 -0800 X-ASF-Spam-Status: No, hits=-100.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO brutus.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 28 Jan 2008 14:42:25 +0000 Received: by brutus.apache.org (Postfix, from userid 33) id 712F071423B; Mon, 28 Jan 2008 06:42:32 -0800 (PST) From: bugzilla@apache.org To: tomcat-dev@jakarta.apache.org Subject: DO NOT REPLY [Bug 44309] - Possible overriding the security state of the connection In-Reply-To: X-Bugzilla-Reason: AssignedTo Message-Id: <20080128144232.712F071423B@brutus.apache.org> Date: Mon, 28 Jan 2008 06:42:32 -0800 (PST) X-Virus-Checked: Checked by ClamAV on apache.org DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG� RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT . ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND� INSERTED IN THE BUG DATABASE. http://issues.apache.org/bugzilla/show_bug.cgi?id=44309 ------- Additional Comments From robert.kovacs@siemens.com 2008-01-28 06:42 ------- Detailed feature request: It would be great if TomCat could offer an interface to influence the decision whether the connection is secured or not in case of isSecure() and scheme() methods. Therefore the actual decision based on the connector configuration could be redefined with our own implementation. The interface could contain a method with an input parameter with type java.net.Socket which belongs to the actual connection and it could return boolean value indicating that the underlying layer is secured or not based on the socket parameter. For example: package org.apache.coyote; public interface SecurityExtension { public boolean isSecure( java.net.Socket socket ) throws Exception; } Similar to protocol attribute of connectors the implementation class of this interface could be specified as an optional connector attribute. The interface method could be invoked in prepareRequest() method of org.apache.coyote.http11.Http11Processor.java where the request scheme attribute can be overridden. -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org For additional commands, e-mail: dev-help@tomcat.apache.org