[
https://issues.apache.org/jira/browse/OPENEJB-473?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Jean-Louis MONTEIRO closed OPENEJB-473.
---------------------------------------
Resolution: Unresolved
2.x code base no more supported
> Selection of transport does not reflect results of negotiation of css/tss
> properties
> ------------------------------------------------------------------------------------
>
> Key: OPENEJB-473
> URL: https://issues.apache.org/jira/browse/OPENEJB-473
> Project: OpenEJB
> Issue Type: Bug
> Components: corba
> Affects Versions: 2.3-unreleased
> Reporter: David Jencks
>
> I'm pretty sure there's a hidden problem in the client side connection setup.
> We haven't seen it yet because no one has tried a compound security mech
> list with more than one element.
> The ClientSecurityInterceptor looks at all the tss choices and all the css
> choices and picks the best match. Therefore the transport should adhere to
> the transport_mech in this chosen compound security mech config. However,
> the SocketFactory constructs the connection based on the first compound
> security mech in the IOR from the target. This might not be compatible with
> the clients capabilities.
> Here's a hypothetical example:
> tss (server) will accept SSL + client auth and no AS transport info OR SSL
> without client auth and UP AS transport info. It prefers the SSL + client
> auth.
> css (client) will only provide SSL without client auth but with UP AS (This
> means it doesn't have a client cert but does have a user/pw that the server
> will recognize)
> Lets suppose the server is offering these choices on different ports.
> Currently the ClientSecurityInterceptor will choose the second CSM from the
> tss info but the SocketFactory will attempt to connect with the first one,
> which will fail since the server socket will be configured with requires
> client auth which isn't available.
> I think we need some way to communicate the ClientSecurityInterceptors'
> choice to the SocketFactory.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators:
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira