Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 751845 - Allow SSL and non-SSL connections on the same port
Allow SSL and non-SSL connections on the same port
Status: CLOSED ERRATA
Product: Red Hat Enterprise MRG
Classification: Red Hat
Component: qpid-cpp (Show other bugs)
2.1
Unspecified Unspecified
medium Severity medium
: 2.1.2
: ---
Assigned To: Gordon Sim
Frantisek Reznicek
: FutureFeature
Depends On:
Blocks: 754376 783492
  Show dependency treegraph
 
Reported: 2011-11-07 13:41 EST by Justin Ross
Modified: 2015-11-15 20:13 EST (History)
4 users (show)

See Also:
Fixed In Version: qpid-cpp-mrg-0.14-3.el5
Doc Type: Enhancement
Doc Text:
Cause: Support in the broker for listening on SSL encrypted sockets and plain TCP sockets is implemented by two distinct modules, each listening on its own port. Consequence: It is not therefore possible to serve both SSL and non-SSL connection from the same port. A deployment requiring both types needs to advertise two port numbers. This is not always possible or convenient Change: The SSL module has been changed to optionally serve plain (non-SSL encrypted) connections using the same port. Result: If required a single port can be advertised that will support both SSL and non-SSL traffic. This is enabled by setting the --ssl-port and --port option to the same value. Note that under this configuration there is at present no support for IPv6 addresses.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-04-30 13:53:06 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0529 normal SHIPPED_LIVE Moderate: Red Hat Enterprise MRG Messaging 2.1 security and enhancement update 2012-04-30 17:48:25 EDT

  None (edit)
Description Justin Ross 2011-11-07 13:41:58 EST
See https://issues.apache.org/jira/browse/QPID-3514
Comment 2 Gordon Sim 2011-11-08 05:16:10 EST
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Cause:

Support in the broker for listening on SSL encrypted sockets and plain TCP sockets is implemented by two distinct modules, each listening on its own port.

Consequence:

It is not therefore possible to serve both SSL and non-SSL connection from the same port. A deployment requiring both types needs to advertise two port numbers. This is not always possible or convenient

Change:

The SSL module has been changed to optionally serve plain (non-SSL encrypted) connections using the same port.

Result:

If required a single port can be advertised that will support both SSL and non-SSL traffic. This is enabled by setting the --ssl-port and --port option to the same value. Note that under this configuration there is at present no support for IPv6 addresses.
Comment 5 Frantisek Reznicek 2012-01-20 03:35:35 EST
The feature has been implemented and it's proved to be functional on RHEL 5.7 / 6.2 i[36]86 / x86_64 on packages:

python-qpid-0.14-1.el5
python-qpid-qmf-0.14-2.el5
qpid-cpp-client-0.14-4.el5
qpid-cpp-client-devel-0.14-4.el5
qpid-cpp-client-devel-docs-0.14-4.el5
qpid-cpp-client-rdma-0.14-4.el5
qpid-cpp-client-ssl-0.14-4.el5
qpid-cpp-mrg-debuginfo-0.14-4.el5
qpid-cpp-server-0.14-4.el5
qpid-cpp-server-cluster-0.14-4.el5
qpid-cpp-server-devel-0.14-4.el5
qpid-cpp-server-rdma-0.14-4.el5
qpid-cpp-server-ssl-0.14-4.el5
qpid-cpp-server-store-0.14-4.el5
qpid-cpp-server-xml-0.14-4.el5
qpid-java-client-0.14-1.el5
qpid-java-common-0.14-1.el5
qpid-java-example-0.14-1.el5
qpid-qmf-0.14-2.el5
qpid-qmf-debuginfo-0.14-2.el5
qpid-qmf-devel-0.14-2.el5
qpid-tests-0.14-1.el5
qpid-tools-0.14-1.el5
ruby-qpid-qmf-0.14-2.el5

-> VERIFIED
Comment 6 errata-xmlrpc 2012-04-30 13:53:06 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2012-0529.html

Note You need to log in before you can comment on or make changes to this bug.