You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tomcat.apache.org by bu...@apache.org on 2007/03/26 00:07:02 UTC
DO NOT REPLY [Bug 39850] - Need a way to invalidate SSL-session from web application
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG�
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=39850>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND�
INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=39850
yoavs@computer.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WONTFIX
------- Additional Comments From yoavs@computer.org 2007-03-25 15:07 -------
Once approved by the user, an SSL certificate will be considered valid for at
least the duration of the browser session (from
http://tomcat.apache.org/tomcat-5.5-doc/ssl-howto.html). In other words, this
is controlled by the client, not by the server, as other places such as
http://forum.java.sun.com/thread.jspa?threadID=790598&messageID=4498738 note.
That's why there's no Servlet Specification hook to let you do what you want,
unlike with the HTTP session. It's not a Tomcat issue.
--
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org
For additional commands, e-mail: dev-help@tomcat.apache.org