Christian Klauser created HTTPCORE-442:
------------------------------------------

             Summary: SSLIOSession + ChunkDecoder: 
MalformedChunkCodingException with last chunk left in inEncryptedBuffer
                 Key: HTTPCORE-442
                 URL: https://issues.apache.org/jira/browse/HTTPCORE-442
             Project: HttpComponents HttpCore
          Issue Type: Bug
            Reporter: Christian Klauser
         Attachments: httpcore-nio-SSLIOSession-eof.path

I'm running into a rather esoteric problem when reading the response to an HTTP 
request using {{httpcore-nio}} (used via CXF). On a high level we get a 
MalfromedChunkCodingException because the ChunkDecoder doesn't receive the last 
chunk ( {{"0\r\n\r\n"}} is missing  ) We see the following situation:

 * The plain text content fed into the SOAP/JAXB deserialization machinery cuts 
off mid-way through
 * *because* the {{ChunkDecoder}} threw a {{MalformedChunkCodingException}}'
 * *because* {{this.buffer.readLine}} returned false
 * *because* (not 100% sure here) {{fillBufferFromChannel}} returned -1 and we 
are looking for the next chunk size
 * *because* the last 106 bytes of the encrypted stream (see below) have never 
been decrypted
 * *because* the loop inside {{SSLIOSession#decryptData}} gets exited early if 
the {{SSLIOSession#endOfStream}} flag is set _even if the input stream still 
contains encrypted data_

{code}
state of the SSLIOSession in `this.channel` when the exception occurs: 
192.168.13.204:48888<->10.0.29.106:443[ACTIVE][r:r][ACTIVE][r][NOT_HANDSHAKING][EOF][][106][0][0][0]
{code}

Looking at past issues/commit messages, I understand why we have an early exit 
here (avoid infinite loops on connections that broke in the middle of a TLS 
packet). I'm not sure if just exiting is correct here. The documentation for 
the java 
[{{SSLEngine#unwrap}}|https://docs.oracle.com/javase/8/docs/api/javax/net/ssl/SSLEngine.html]
 method says that the engine tries to decrypt "one complete TLS network 
packet". There is no guarantee that it decrypts all remaining packets in the 
buffer.

In our particular case (106 still encrypted bytes), we have to run the 
{{unwrap}} method two more times until we have the complete response from the 
server (including the final chunk "{{0\r\n\r\n}}"). After the first additional 
call, there are still 53 encrypted bytes left.

I have attached a patch that solves this issue for us. The patch monitors 
whether the decryption loop is making progress and keeps looping even if 
{{endOfStream}} is set. It aborts after a number of iterations without clear 
progress. With this patch, we can run our entire integration test suite without 
error. Without this patch, about 1 in SOAP 200 calls fails.

The "progress measurement" logic could perhaps be simplified (only measure 
plain bytes, not also consumed encrypted bytes), but I'm not sure if that would 
still be correct.

I could also imagine that the actual bug is in the ChunkDecoder, that doesn't 
give the Channel another chance at filling the buffer, but the SSLIOSession 
code looks more suspicious to me (signalling EOF with 106 bytes left encrypted).

What do you think?



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to