Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Jamil Nimeh
Hi Xuelei, thanks for the feedback.  A couple comments in-line below. On 6/5/2019 5:37 PM, Xuelei Fan wrote: On 6/5/2019 4:57 PM, Jamil Nimeh wrote: I think what it's saying is that what was explicitly called out in 4507 (where there is both the extension_data length bytes AND the opaque vec

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
;-) I want to try again by putting all things together. Per RFC 5077 (page 18, appendix A): "Note that the encoding of an empty SessionTicket extension was ambiguous in RFC 4507. An RFC 4507 implementation may have encoded it as: 00 23 Extension type 35 00 02 L

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
On 6/5/2019 8:25 PM, Anthony Scarpino wrote: On 6/5/19 7:30 PM, Xuelei Fan wrote: On 6/5/2019 7:21 PM, Anthony Scarpino wrote: On Jun 5, 2019, at 5:37 PM, Xuelei Fan wrote: On 6/5/2019 4:57 PM, Jamil Nimeh wrote: I think what it's saying is that what was explicitly called out in 4507 (whe

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Anthony Scarpino
On 6/5/19 7:30 PM, Xuelei Fan wrote: On 6/5/2019 7:21 PM, Anthony Scarpino wrote: On Jun 5, 2019, at 5:37 PM, Xuelei Fan wrote: On 6/5/2019 4:57 PM, Jamil Nimeh wrote: I think what it's saying is that what was explicitly called out in 4507 (where there is both the extension_data length byt

Re: [13] RFR JDK-8080462: Update SunPKCS11 provider with PKCS11 v2.40 support

2019-06-05 Thread Valerie Peng
Hi Jamil, Thanks much for reviewing this~ On 6/5/2019 9:21 AM, Jamil Nimeh wrote: Hi Valerie, on the whole it looks really good.  I do have some comments below: * SunPKCS11.java o 728-738: I think you could add 2.16.840.1.101.3.4.3.3 and .4 for dsa-with-sha384 and dsa-with-sha

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
On 6/5/2019 7:21 PM, Anthony Scarpino wrote: On Jun 5, 2019, at 5:37 PM, Xuelei Fan wrote: On 6/5/2019 4:57 PM, Jamil Nimeh wrote: I think what it's saying is that what was explicitly called out in 4507 (where there is both the extension_data length bytes AND the opaque vector length) is n

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Anthony Scarpino
> On Jun 5, 2019, at 5:37 PM, Xuelei Fan wrote: > > > >> On 6/5/2019 4:57 PM, Jamil Nimeh wrote: >> I think what it's saying is that what was explicitly called out in 4507 >> (where there is both the extension_data length bytes AND the opaque vector >> length) is not how deployed implement

Re: RFR 8225304: tiny HTML error (bad heading) in org.ietf.jgss package-info.java

2019-06-05 Thread Xuelei Fan
It looks fine to me. Xuelei On 6/5/2019 7:19 PM, Weijun Wang wrote: Please review the patch below. Bug is https://bugs.openjdk.java.net/browse/JDK-8225304. Thanks, Max *diff --git a/src/java.security.jgss/share/classes/org/ietf/jgss/package-info.java b/src/java.security.jgss/share/classes/

RFR 8225304: tiny HTML error (bad heading) in org.ietf.jgss package-info.java

2019-06-05 Thread Weijun Wang
Please review the patch below. Bug is https://bugs.openjdk.java.net/browse/JDK-8225304. Thanks, Max diff --git a/src/java.security.jgss/share/classes/org/ietf/jgss/package-info.java b/src/java.security.jgss/share/classes/org/ietf/jgss/package-info.java --- a/src/java.security.jgss/share/classe

Re: RFR JDK-8225390: ProblemList sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java due to JDK-8161536

2019-06-05 Thread Xuelei Fan
It looks good to me. Xuelei On 6/5/2019 7:01 PM, [email protected] wrote: Hi, Test sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java should be in ProblemList until JDK-8161536 is resolved. diff -r 184b05daf50f test/jdk/ProblemList.txt --- a/test/jdk/ProblemList.txt    Wed Jun 05 21:50:

RFR JDK-8225390: ProblemList sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java due to JDK-8161536

2019-06-05 Thread sha . jiang
Hi, Test sun/security/pkcs11/sslecc/ClientJSSEServerJSSE.java should be in ProblemList until JDK-8161536 is resolved. diff -r 184b05daf50f test/jdk/ProblemList.txt --- a/test/jdk/ProblemList.txt    Wed Jun 05 21:50:29 2019 -0400 +++ b/test/jdk/ProblemList.txt    Thu Jun 06 09:58:13 2019 +0800 @

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-05 Thread Weijun Wang
Hi Martin, The new test in the changeset uses a simple homemade KDC and we might want to develop some internal tests that access real KDCs. For the server referral part, I think we can clone some existing cross-realm authentication test and remove the [domain_realm] part in the client's krb5.co

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-05 Thread Weijun Wang
> On Jun 6, 2019, at 3:22 AM, Martin Balao wrote: > > If there are no further comments and jdk-submit tests succeed, I'll push > tomorrow (2019-06-06) at around 11 am EST. None from me. Such a new feature would need a release note. I've created a skeleton at https://bugs.openjdk.java.net/br

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
On 6/5/2019 4:57 PM, Jamil Nimeh wrote: I think what it's saying is that what was explicitly called out in 4507 (where there is both the extension_data length bytes AND the opaque vector length) is not how deployed implementations did it. It implies that deployed implementations do what you

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Jamil Nimeh
I think what it's saying is that what was explicitly called out in 4507 (where there is both the extension_data length bytes AND the opaque vector length) is not how deployed implementations did it. It implies that deployed implementations do what you laid out below where you just have 2 bytes

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
I'm not sure I understand the following words in page 17, RFC 5077. " An error in the encoding caused the specification to differ from deployed implementations. At the time of this writing there are no known implementations that follow the encoding specified in RFC 4507. " Is it means th

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
On 6/5/2019 3:37 PM, Jamil Nimeh wrote: I think we're overstating the "otherwise" case.  A client that uses this strict 4507 format would initially send a ticket that looks like { 00 23 00 02 00 00 } to which our server would reject this extension (since the final 00 00 would be interpreted as

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Jamil Nimeh
I think we're overstating the "otherwise" case.  A client that uses this strict 4507 format would initially send a ticket that looks like { 00 23 00 02 00 00 } to which our server would reject this extension (since the final 00 00 would be interpreted as a ticket when the client did not intend

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
I don’t know if there are any deployment of RFC 4507. If not, we are safe; otherwise there are interop problems for session resumption. Xuelei > On Jun 5, 2019, at 2:19 PM, Jamil Nimeh wrote: > > Hi Xuelei, > > Given that 4507 is obsoleted in favor of 5077 is there really that much value >

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Jamil Nimeh
Hi Xuelei, Given that 4507 is obsoleted in favor of 5077 is there really that much value to supporting this older/broken extension format?  Do we know of clients that still adhere to 4507?  Otherwise it seems better to stick to 5077 and the approach in TLS 1.3 and not try to go back and suppor

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
On 6/5/2019 12:41 PM, Anthony Scarpino wrote: http://cr.openjdk.java.net/~ascarpino/stateless/webrev.02 SessionTicketExtension.java:   117 byte[] k = new byte[KEYLEN];   118 random.nextBytes(k);   119 key = new SecretKeySpec

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Anthony Scarpino
On 6/4/19 9:02 PM, Xuelei Fan wrote: Hi Tony, There are a lot of pretty good designs in the update, for example, the cooperation of the session timeout and key rotation timeout. My following comments are mainly about the issues I can find.  Most of them are minors. On 6/3/2019 5:42 PM, Ant

Re: RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-06-05 Thread Martin Balao
Hi Max, Thanks for your feedback. On 6/4/19 12:28 AM, Weijun Wang wrote: > - java.security typos: > >492,497: ovewritten >496: infite > Fixed. > - CredentialsUtils.java: > >36: unused import > Fixed. > - KDCRep.java: > >no need to move the position > Fixed. > - Referra

Re: RFR 8211018: Session Resumption without Server-Side State

2019-06-05 Thread Xuelei Fan
Continue for the SessionTicketExtension.java. On 6/3/2019 5:42 PM, Anthony Scarpino wrote: http://cr.openjdk.java.net/~ascarpino/stateless/webrev.02 SessionTicketExtension.java (continue): --- 231 SessionStateSpec(ByteBuffer buf) throws IOException

Selecting private key with Windows-MY

2019-06-05 Thread Michael Osipov
Folks, I am trying to perform TLS auth with a PKCS12 and Windows-MY keystores with HttpClient 4.5.6 + Java 8, Update 212 in Windows 7. While with the .p12 (contains one key and its cert) file everything goes smoothly and fast, I am having trouble with Windows-MY with my smartcard. Loading the st

Re: [13] RFR JDK-8080462: Update SunPKCS11 provider with PKCS11 v2.40 support

2019-06-05 Thread Jamil Nimeh
Hi Valerie, on the whole it looks really good.  I do have some comments below: * SunPKCS11.java o 728-738: I think you could add 2.16.840.1.101.3.4.3.3 and .4 for dsa-with-sha384 and dsa-with-sha512, respectively. o 790-792: Are you sure that's the right OID?  OID lookup shows