Mark Thomas wrote:
From: Filip Hanik - Dev Lists [mailto:[email protected]]

this implementation may ask for more than is warranted. I would -1
based
on for example

"javax.servlet.request.ssl_session_mgr";
shouldn't extensions be named differently, and not within the
javax.servlet namespace?

We already have custom extensions for SSL attributes in this namespace.
should we still continue down that route? I'm lenient either way, but would have preferred to separate out the two.
SSLSessionManager.invalidateSession

 > not sure why the SSL sessions should invalidated when a HttpSession
is invalidated. I should be able to continue my SSL session even after
I
invalidate my HttpSession

There have been a few requests on the users list for the ability to invalidate 
the SSL session. I wanted to see what the code would look like. I'm not against 
removing the SSL session invalidation part of this patch. The downside would be 
the inability to invalidate the SSL Session, the plus would be simpler code and 
the removal of some of the restrictions on when you could use SSL session 
tracking.

Some clarification from the EG on what session.invalidate() means when using 
SSL tracking would be helpful. The doc on this area is just what is in the 
Javadoc and that doesn't really give any insight into the thinking that went on 
behind this particualr change.
I can post that question to the EG for you. However, there is nothing that ties HttpSession behavior to SSL session behavior. The idea is that you simply use the SSL session Id instead of the JSESSIONID cookie. and for that, you can get away with using the javax.servlet.request.ssl_session_id. This way you also allow mod_jk to work (httpd offload) and other ssl accelerators that might pass the info to the SSLValve
also, there are so many changes for this, when in fact the request you
already have the SSL session ID in the request attribute
SSL session id -> javax.servlet.request.ssl_session_id of type
java.lang.String

why tracking sessions using SSL is part of the servlet spec, there are
probably many different ways of implementing it, and I think it could
be
simpler than this, so maybe its a good idea to discuss such changes on
the dev list first.

The simple solution, as you suggest, is just to use the SSL Session ID. I had 
that working quite quickly with a much smaller patch.
That's what's required for implementation.
As I type and the more I think about this, it really does come down to what 
session.invalidate() means when using SSL Session tracking. If you were using 
cookies, then the session ID would be reused. That suggests it isn't necessary 
to invalidate the SSL session. However, there is a demand from the user 
community for this ability and I think it is a useful feature to have.
If there is a demand, and users deem the feature useful, it is still a separate concern, and should probably be implemented separate all together. SSL session tracking can be implemented very light weight, and very low risk.

Filip
On reflection, I might have a way to invalidate the SSL session without all the 
extra code. I'll do some testing and post the results.

Mark



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]




---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to