Re: [10] RFR : 8186628 : SSL session cache can cause a scalability bottleneck

2017-11-20 Thread Xuelei Fan
Hi Ivan, I understand the desire of performance improvement. But I don't think avoiding the use of cache is the price we want to pay for. Besides, avoiding using of session cache is not something improving the performance in general, it is typically something impacting the performance, a

Re: [10] RFR : 8186628 : SSL session cache can cause a scalability bottleneck

2017-11-20 Thread Ivan Gerasimov
Gentle ping. If people agree on the approach, I'll go ahead and file a CCC request for the new recognized system property. With kind regards, Ivan On 11/7/17 6:24 PM, Ivan Gerasimov wrote: Hello everybody! The class sun.security.ssl.SSLSessionContextImpl maintains caches for the

Re: Eliminating the security overhead when not running with a security manager

2017-11-20 Thread David Lloyd
One thing that springs to mind. Some allowance would have to be made for domain combiners and JAAS Subject propagation: this mechanism also uses access control contexts, to its own great detriment. I would say that the JAAS domain combiner strategy should be dropped in favor of a simple thread

Re: KDF API review, round 2

2017-11-20 Thread Jamil Nimeh
On 11/20/2017 12:34 PM, Michael StJohns wrote: On 11/20/2017 1:10 PM, Jamil Nimeh wrote: You're missing the point that setParameter() provides information used in all future calls to the signature generation, while init() provides data specifically for a given key stream production.  In

Re: Eliminating the security overhead when not running with asecuritymanager

2017-11-20 Thread Bernd Eckenfels
Yes Alan correct: I wrongly asumed ist a separate stack. So it is a non-issue. I tried it out and having a doPriv(lambda) block shortens the possible overall thread dept by about 200 calls (with my simple stack usage). BTW: the main thread does behave a bit less predictable: (run results at

Re: KDF API review, round 2

2017-11-20 Thread Michael StJohns
On 11/20/2017 1:10 PM, Jamil Nimeh wrote: You're missing the point that setParameter() provides information used in all future calls to the signature generation, while init() provides data specifically for a given key stream production.  In Signature() you call .setParameter() to set up the

Re: Eliminating the security overhead when not running with a securitymanager

2017-11-20 Thread Bernd Eckenfels
Hello Alan, not sure if it is good or bad to make the security manager even less Mainstream (especially after there was a Project to reduce the Impact of security Manager). However, not diving into this discussion here :) One thing which might be a problem: when doPrivileged does no longer

Re: KDF API review, round 2

2017-11-20 Thread Adam Petcher
On 11/20/2017 11:17 AM, Michael StJohns wrote: One additional topic for discussion: Late in the week we talked about the current state of the API internally and one item to revisit is where the DerivationParameterSpec objects are passed. It was brought up by a couple people that it would

Re: RFR - 8189646: sun/security/ssl/SSLSocketImpl/SSLSocketCloseHang.java failed with "java.net.SocketTimeoutException: Read timed out"

2017-11-20 Thread Seán Coffey
This should help harden the test. Looks fine to me. Regards, Sean. On 20/11/17 16:16, Rob McKenna wrote: Hi folks, This test appears to be timing out. The main culprit looks to be the fact that the 100ms sleep isn't enough for the server to respond (on a busy test machine) so that timeout has

Re: KDF API review, round 2

2017-11-20 Thread Michael StJohns
Apologies in advance for top posting and a need to be a little pedantic about KDFs.  I'll have some comments inline below as well. KDF's aren't well understood but people think they are.  The key stream generation part is pretty straightforward (keyed PRBG), but the interaction of how the key

RFR - 8189646: sun/security/ssl/SSLSocketImpl/SSLSocketCloseHang.java failed with "java.net.SocketTimeoutException: Read timed out"

2017-11-20 Thread Rob McKenna
Hi folks, This test appears to be timing out. The main culprit looks to be the fact that the 100ms sleep isn't enough for the server to respond (on a busy test machine) so that timeout has been bumped and some new logging has been added to make it obvious whats happening should the problem occur

Re: Draft design for Key Derivation API

2017-11-20 Thread Adam Petcher
On 11/19/2017 3:15 PM, Michael StJohns wrote: That behavior all sounds reasonable, I just have doubts that this belongs in the spec. Are you expecting KeyDerivation to contain the logic in your last paragraph? Something like this: KDFs are somewhat problematic in that *_they may not

Re: KDF API review, round 2

2017-11-20 Thread Adam Petcher
On 11/20/2017 5:12 AM, Jamil Nimeh wrote: On 11/19/2017 12:45 PM, Michael StJohns wrote: On 11/17/2017 1:07 PM, Adam Petcher wrote: I agree that this is challenging because there is so much variety in KDFs. But I don't think that SP 800-108 is a good example of something that should be

Eliminating the security overhead when not running with a security manager

2017-11-20 Thread Alan Bateman
One of the long standing issues with the security manager support is that the overhead when there is no security manager is non-zero. Two specific examples are (i) the overhead of defineClass (assuming the defining loader is a SecureClassLoader) as it involves a callback to get the

Re: KDF API review, round 2

2017-11-20 Thread Jamil Nimeh
On 11/19/2017 12:45 PM, Michael StJohns wrote: On 11/17/2017 1:07 PM, Adam Petcher wrote: On 11/17/2017 10:04 AM, Michael StJohns wrote: On 11/16/2017 2:15 PM, Adam Petcher wrote: So it seems like they could all be supplied to init. Alternatively, algorithm names could specify more