On Tue, 8 Feb 2022 13:51:57 GMT, Martin Balao <mba...@openjdk.org> wrote:

> > @martinuy, I am the reporter of JDK-8160768. Regarding this PR, isn't 
> > everything protocol related a fail-fast issue? E.g., if the socket is up 
> > and running, but the LDAP message is rejected can we assume that all 
> > subsequent servers for the same resolution will reject the request as well 
> > before authentication has happened?
> 
> It looks to me that it's not only a fail-fast issue because the state on the 
> directory side might be altered by each try, as it happened in the reported 
> case. In other words, the client might cause a denial-of-service blocking an 
> account by trying multiple times the same incorrect authentication 
> credentials on each resolved server.

Let me add a few points for consideration from my usecases, since I don't use 
any password-based authentication with SASL and Active Directory only:
* `SASL EXTERNAL`: What if the certificate is rejected? Trust store is not 
properly populated, CRL misconfigured, etc. Will an exception also thrown here?
* `SASL GSSAPI/GSS-SPNEGO`: Dir server does not manage creds, but KDC does. I 
am thinking whether fail fast is reasonable. SPN not registered, next server 
might have. replay/out of sequence, etc.

> In regards to the 2nd question, I guess that we cannot assume that. But the 
> revert is intended for failed authentication only.

But the auth is part of the LDAP message as well since the auth does not happen 
out of band. I would expect that any non-transport issue should fail fast.

> Is there a risk that you foresee by reverting the failed-authentication 
> behavior back to pre-JDK-8160768?

Not really, I virtually never had problems, thought might need annotations when 
this does not work, see above.

-------------

PR: https://git.openjdk.java.net/jdk/pull/6043

Reply via email to