Github user shinrich commented on the pull request:

    https://github.com/apache/trafficserver/pull/162#issuecomment-69942861
  
    Looks good to me. Originally concerned that the transparent_passthrough 
state was being needlessly duplicated, but the HttpSM is not here yet at this 
point.  And you are following the pattern of the HttpSessionAccept.  One minor 
nit, is that I would "and" in port.m_inbound_transparent_p when setting the 
transparent allowed flag in SSLNextProtocolAccept.  It is just a bit of extra 
error checking.  If the connection is not at least inbound transparent, 
transparent passthrough makes no sense.  This is checked via the HttpSM method 
is_transparent_passthrough_allowed on the Http path.
    
    The check for the CLIENT_HELLO handshake operator in the SSL error case 
seems fine.  You may get unlucky and have non SSL traffic with a first byte of 
0x16, and not blind tunnel it.  But checking for more bytes gets complicated 
(e.g. checking that the next byte is not any valid SSL version).  In practice 
the simple check is likely fine, and it is highly unlikely that you will suck 
in legitimate SSL handshake exchanges into the blind tunnel.
    
    I'm going to take it for a spin on my dev box, and then merge it up.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

Reply via email to