Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-19 Thread serguei.spit...@oracle.com

On 5/19/17 06:22, Robbin Ehn wrote:

Hi,

On 05/19/2017 08:27 AM, serguei.spit...@oracle.com wrote:

On 5/18/17 04:05, Robbin Ehn wrote:

Hi of those:


One more alternate solution to suggest is to add new function:
jdwpTransportError 
SetTransportConfiguration(jdwpTransportConfiguration config);


Where:
   typedef struct {
   const char* allowed_peers;
   } jdwpTransportConfiguration;


This approach allows to extend the jdwpTransportConfiguration in 
the future if necessary.


+1

It would nice if a compiled client against JDK 8 headers works 
without recompiling with a JDK 9 runtime.
To make really future proof; using a client compiled against JDK 9 
with JDK 1X you will need some way to know witch version of the 
struct was used.


E.g. SetTransportConfiguration(&config, 
JDWP_TRANSPORT_CONFIGURATION_CURRENT_VERSION);


No need to have a separate transport configuration versioning.
It is enough to have just a transport API versioning.


My thought when writing that was to not add the transport API versioning.
But as you say if that is there, we already know the struct version.


Right.

Thanks,
Serguei



/Robbin



Thanks,
Serguei




Thanks, Robbin!






Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-19 Thread Robbin Ehn

Hi,

On 05/19/2017 08:27 AM, serguei.spit...@oracle.com wrote:

On 5/18/17 04:05, Robbin Ehn wrote:

Hi of those:


One more alternate solution to suggest is to add new function:
jdwpTransportError SetTransportConfiguration(jdwpTransportConfiguration config);

Where:
   typedef struct {
   const char* allowed_peers;
   } jdwpTransportConfiguration;


This approach allows to extend the jdwpTransportConfiguration in the future if 
necessary.


+1

It would nice if a compiled client against JDK 8 headers works without 
recompiling with a JDK 9 runtime.
To make really future proof; using a client compiled against JDK 9 with JDK 1X 
you will need some way to know witch version of the struct was used.

E.g. SetTransportConfiguration(&config, 
JDWP_TRANSPORT_CONFIGURATION_CURRENT_VERSION);


No need to have a separate transport configuration versioning.
It is enough to have just a transport API versioning.


My thought when writing that was to not add the transport API versioning.
But as you say if that is there, we already know the struct version.

/Robbin



Thanks,
Serguei




Thanks, Robbin!




Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-19 Thread serguei.spit...@oracle.com

Dmitry,


On 5/18/17 04:33, Dmitry Samersoff wrote:

Serguei,

*a*


4. The suggested *allow* feature is too destructive for the
transport API. It makes the original function StartListening unusable
and its entry slot a garbage. It will become a big mess if we add
more function clones like StartListening11. . . . 6. The suggested
API update makes the transport API VERSION_1_1 incompatible with the
initial VERSION_1_0.

Transport 1.0 uses StartListening slot. Transport 1.1 uses
StartListeningWithAllow slot.

I don't see any difference between this approach and approach of adding
extra slot and extra function.

Transport 1.0 will continue to work as is (ever without recompilation).
Transport 1.1 will crash if it doesn't fill proper slot.


It is not good enough.
The Transport 1.1 can also support and be compatible with the 1.0 API.
It works well for both alternate approaches.
It does not work in your case (see the webrev.18).

The API will become ugly and messy if more function clones
like the StartListening clones are added in the future.
The old duplicates hold the API slots that become unusable.




*b*

I'm against separate Allow() call because:

1) Socket communication steps is well known. Extra step (call Allow
before StartListen) is not natural.


I'm rejecting this argument.
The StartListeningWithAllow step is also not well known and natural.
There is no problem to add the AllowPeers step.



2) API have to clear visible and self documenting.

If transport developer doesn't implement Allow() they doesn't
see any sign of mistake until they starts testing the
transport with allow parameter.

As opposite unused parameter is clear visible and cause compiler warning.


This argument also looks strange to me.
Why would not the transport developer implement AllowPeers()
if he is trying to implement the transport 1.1 API?
It is the developer responsibility.



3) In a future, parsing of allow list might require results of socket
call (e.g. to distinguish between IPv4 only and IPv4/Ipv6 cases)


There is no point to discuss the IPv6 until the API for it is suggested.
Otherwise, this discussion is too abstract.



*c*

As for configuration structures, any jdwpConfiguration structure
requires versioning i.e. see webrev.15. But we decided to go in other
direction.


(already replied to Robbin)
No need to have a separate versioning for the jdwpConfiguration.
The transport API version will work well for it.


Thanks,
Serguei





-Dmitry


On 2017-05-18 13:20, serguei.spit...@oracle.com wrote:

Hi Dmitry,

Let's get to a consensus for the last item on our plate:
jdwpTransportError AllowPeers(const char* peers); .VS.
jdwpTransportError StartListeningWithAllow(const char* address,
char** actual_address, char *allow);


I still do not like the StartListening() function clone and its
name. It looks like a wrong direction to me.

This is a fragment of my bug report comment on this issue:

4. The suggested *allow* feature is too destructive for the
transport API. It makes the original function StartListening unusable
and its entry slot a garbage. It will become a big mess if we add
more function clones like StartListening11. . . . 6. The suggested
API update makes the transport API VERSION_1_1 incompatible with the
initial VERSION_1_0.


One more alternate solution to suggest is to add new function:
jdwpTransportError
SetTransportConfiguration(jdwpTransportConfiguration config);

Where: typedef struct { const char* allowed_peers; }
jdwpTransportConfiguration;


This approach allows to extend the jdwpTransportConfiguration in the
future if necessary. However, I'm not sure we really need this
ability.


Both alternatives allow for the transport library to support both
API versions. It is good by itself and also, it is a way to simplify
the transport library.

We could formulate the following requirements to the API updates: -
the transport API update must support previous API versions - the
updated API layout must be compatible with previous versions

It seems to me, these requirements are achievable and two alternate
approaches show it.

Please, share your opinions?


Thanks, Serguei


Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-18 Thread serguei.spit...@oracle.com

On 5/18/17 04:05, Robbin Ehn wrote:

Hi of those:


One more alternate solution to suggest is to add new function:
jdwpTransportError 
SetTransportConfiguration(jdwpTransportConfiguration config);


Where:
   typedef struct {
   const char* allowed_peers;
   } jdwpTransportConfiguration;


This approach allows to extend the jdwpTransportConfiguration in the 
future if necessary.


+1

It would nice if a compiled client against JDK 8 headers works without 
recompiling with a JDK 9 runtime.
To make really future proof; using a client compiled against JDK 9 
with JDK 1X you will need some way to know witch version of the struct 
was used.


E.g. SetTransportConfiguration(&config, 
JDWP_TRANSPORT_CONFIGURATION_CURRENT_VERSION);


No need to have a separate transport configuration versioning.
It is enough to have just a transport API versioning.

Thanks,
Serguei




Thanks, Robbin!




Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-18 Thread Dmitry Samersoff
Robbin,

Please, see my answer to Serguei.

-Dmitry

On 2017-05-18 14:05, Robbin Ehn wrote:
> Hi of those:
> 
>> One more alternate solution to suggest is to add new function:
>> jdwpTransportError
>> SetTransportConfiguration(jdwpTransportConfiguration config);
>>
>> Where:
>>typedef struct {
>>const char* allowed_peers;
>>} jdwpTransportConfiguration;
>>
>>
>> This approach allows to extend the jdwpTransportConfiguration in the
>> future if necessary.
> 
> +1
> 
> It would nice if a compiled client against JDK 8 headers works without
> recompiling with a JDK 9 runtime.
> To make really future proof; using a client compiled against JDK 9 with
> JDK 1X you will need some way to know witch version of the struct was used.
> 
> E.g. SetTransportConfiguration(&config,
> JDWP_TRANSPORT_CONFIGURATION_CURRENT_VERSION);
> 
> Thanks, Robbin!


-- 
Dmitry Samersoff
Oracle Java development team, Saint Petersburg, Russia
* I would love to change the world, but they won't give me the sources.


Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-18 Thread Dmitry Samersoff
Serguei,

*a*

> 4. The suggested *allow* feature is too destructive for the
> transport API. It makes the original function StartListening unusable
> and its entry slot a garbage. It will become a big mess if we add
> more function clones like StartListening11. . . . 6. The suggested
> API update makes the transport API VERSION_1_1 incompatible with the
> initial VERSION_1_0.

Transport 1.0 uses StartListening slot. Transport 1.1 uses
StartListeningWithAllow slot.

I don't see any difference between this approach and approach of adding
extra slot and extra function.

Transport 1.0 will continue to work as is (ever without recompilation).
Transport 1.1 will crash if it doesn't fill proper slot.

*b*

I'm against separate Allow() call because:

1) Socket communication steps is well known. Extra step (call Allow
before StartListen) is not natural.

2) API have to clear visible and self documenting.

If transport developer doesn't implement Allow() they doesn't
see any sign of mistake until they starts testing the
transport with allow parameter.

As opposite unused parameter is clear visible and cause compiler warning.

3) In a future, parsing of allow list might require results of socket
call (e.g. to distinguish between IPv4 only and IPv4/Ipv6 cases)

*c*

As for configuration structures, any jdwpConfiguration structure
requires versioning i.e. see webrev.15. But we decided to go in other
direction.

-Dmitry


On 2017-05-18 13:20, serguei.spit...@oracle.com wrote:
> Hi Dmitry,
> 
> Let's get to a consensus for the last item on our plate: 
> jdwpTransportError AllowPeers(const char* peers); .VS. 
> jdwpTransportError StartListeningWithAllow(const char* address,
> char** actual_address, char *allow);
> 
> 
> I still do not like the StartListening() function clone and its
> name. It looks like a wrong direction to me.
> 
> This is a fragment of my bug report comment on this issue:
> 
> 4. The suggested *allow* feature is too destructive for the
> transport API. It makes the original function StartListening unusable
> and its entry slot a garbage. It will become a big mess if we add
> more function clones like StartListening11. . . . 6. The suggested
> API update makes the transport API VERSION_1_1 incompatible with the
> initial VERSION_1_0.
> 
> 
> One more alternate solution to suggest is to add new function: 
> jdwpTransportError 
> SetTransportConfiguration(jdwpTransportConfiguration config);
> 
> Where: typedef struct { const char* allowed_peers; }
> jdwpTransportConfiguration;
> 
> 
> This approach allows to extend the jdwpTransportConfiguration in the 
> future if necessary. However, I'm not sure we really need this
> ability.
> 
> 
> Both alternatives allow for the transport library to support both
> API versions. It is good by itself and also, it is a way to simplify
> the transport library.
> 
> We could formulate the following requirements to the API updates: -
> the transport API update must support previous API versions - the
> updated API layout must be compatible with previous versions
> 
> It seems to me, these requirements are achievable and two alternate 
> approaches show it.
> 
> Please, share your opinions?
> 
> 
> Thanks, Serguei
> 
> 
> 
> On 5/12/17 02:10, serguei.spit...@oracle.com wrote:
>> Hi Dmitry,
>> 
>> Thank you for the update with some review comments resolved! I
>> looked at it but will not provide my comments at this point. We
>> will need another update according to the recent design review and
>> items where we still have to reach an agreement.
>> 
>> Thanks, Serguei
>> 
>> 
>> On 5/10/17 08:27, Dmitry Samersoff wrote:
>>> Serguei,
>>> 
>>> Fixed minor issues (comments, netmask etc). Added an error for
>>> attempt to use allow with an old transport.
>>> 
>>> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.17/
>>> 
>>> see also below.
>>> 
>>> 
 I do not understand this reason for adding more complexity. It
 seems, there should not be any issues in the future with
 rejecting all unsupported versions by the transport library.
>>> Added a diagram explaining transport version negotiation to CR. I
>>> use future versions (1.3; 1.4; 1.5) because all this versioning
>>> staff has a long term goal and allow us to develop better
>>> transport without breaking existing one.
>>> 
 We are not adding extra parameter, we are introducing new
 function that is a clone of another StartListening function
 with a version suffix '11' in its name and with an extra
 parameter.
>>> Correct. We changed behavior of StartListening function and 1.1 
>>> transport shouldn't care about old one.
>>> 
>>> i.e. when we document 1.1 interface we describe the only
>>> function StartListening(env, address, actualAddress, allow) that
>>> have to be placed to the StartListening11 slot.
>>> 
>>> 
>>> Back in 2015 I proposed to separate interfaces entirely (see
>>> webrev.04), but we (Alan?) decided that it's an overkill.
>>> 
 The original StartListening function is bei

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-18 Thread Robbin Ehn

Hi of those:


One more alternate solution to suggest is to add new function:
jdwpTransportError SetTransportConfiguration(jdwpTransportConfiguration config);

Where:
   typedef struct {
   const char* allowed_peers;
   } jdwpTransportConfiguration;


This approach allows to extend the jdwpTransportConfiguration in the future if 
necessary.


+1

It would nice if a compiled client against JDK 8 headers works without 
recompiling with a JDK 9 runtime.
To make really future proof; using a client compiled against JDK 9 with JDK 1X 
you will need some way to know witch version of the struct was used.

E.g. SetTransportConfiguration(&config, 
JDWP_TRANSPORT_CONFIGURATION_CURRENT_VERSION);

Thanks, Robbin!


Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-18 Thread serguei.spit...@oracle.com

  
  
Hi Dmitry,
  
  Let's get to a consensus for the last item on our plate:
   
  
  
  jdwpTransportError AllowPeers(const
  char* peers);
                   .VS.
    jdwpTransportError
StartListeningWithAllow(const char* address,
   char** actual_address, char *allow);


I still do not like the StartListening() function clone
and its name.
  
  
  It looks like a wrong direction to me.
  
  This is a fragment of my bug report comment on this issue:
  
  
    4. The suggested *allow* feature is too destructive for the
  transport API.
  
       It makes the original function StartListening unusable and
  its entry slot a garbage.
  
       It will become a big mess if we add more function clones like
  StartListening11.
  
    . . .
    6. The suggested API update makes the transport API VERSION_1_1
  
       incompatible with the initial VERSION_1_0.
  
  
  
  One more alternate solution to suggest is to add new function:
     jdwpTransportError SetTransportConfiguration(jdwpTransportConfiguration
  config);
  
  Where:
    typedef struct {
    const char* allowed_peers;
    } jdwpTransportConfiguration;
  
  
  This approach allows to extend the jdwpTransportConfiguration in
  the future if necessary.
  However, I'm not sure we really need this ability.
  
  
  Both alternatives allow for the transport library to support both
  API versions.
  It is good by itself and also, it is a way to simplify the
  transport library.
  
  We could formulate the following requirements to the API updates:
    - the transport API update must support previous API versions
    - the updated API layout must be compatible with previous
  versions
  
  It seems to me, these requirements are achievable and two
  alternate approaches show it.
  
  Please, share your opinions?
      
  
  Thanks,
  Serguei
  
  
  
  On 5/12/17 02:10, serguei.spit...@oracle.com wrote:

Hi Dmitry,
  
  
  Thank you for the update with some review comments resolved!
  
  I looked at it but will not provide my comments at this point.
  
  We will need another update according to the recent design review
  
  and items where we still have to reach an agreement.
  
  
  Thanks,
  
  Serguei
  
  
  
  On 5/10/17 08:27, Dmitry Samersoff wrote:
  
  Serguei,


Fixed minor issues (comments, netmask etc).

Added an error for attempt to use allow with an old transport.


http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.17/


see also below.



I do not understand this reason for
  adding more complexity.
  
  It seems, there should not be any issues in the future with
  rejecting
  
  all unsupported versions by the transport library.
  

Added a diagram explaining transport version negotiation to CR.
I use

future versions (1.3; 1.4; 1.5) because all this versioning
staff has a

long term goal and allow us to develop better transport without
breaking

existing one.


We are not adding extra parameter, we
  are introducing new function
  
  that is a clone of another StartListening function with a
  version
  
  suffix '11' in its name and with an extra parameter.
  

Correct. We changed behavior of StartListening function and 1.1

transport shouldn't care about old one.


i.e. when we document 1.1 interface we describe the only
function

StartListening(env, address, actualAddress, allow)

that have to be placed to the StartListening11 slot.



Back in 2015 I proposed to separate interfaces entirely (see
webrev.04),

but we (Alan?) decided that it's an overkill.


The original StartListening function is
  being removed.
  
  It is much simpler to introduce new function AllowPeers(char*
  peers)
  
  with the same parameter.
  

This separate function have to be called explicitly before we
start

listening, It is extra communication step. IMHO, not obvious
one.


So I would prefer to keep StartListening11


-Dmitry



On 2017-05-10 12:37, se

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-12 Thread serguei.spit...@oracle.com

Hi Dmitry,

Thank you for the update with some review comments resolved!
I looked at it but will not provide my comments at this point.
We will need another update according to the recent design review
and items where we still have to reach an agreement.

Thanks,
Serguei


On 5/10/17 08:27, Dmitry Samersoff wrote:

Serguei,

Fixed minor issues (comments, netmask etc).
Added an error for attempt to use allow with an old transport.

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.17/

see also below.



I do not understand this reason for adding more complexity.
It seems, there should not be any issues in the future with rejecting
all unsupported versions by the transport library.

Added a diagram explaining transport version negotiation to CR. I use
future versions (1.3; 1.4; 1.5) because all this versioning staff has a
long term goal and allow us to develop better transport without breaking
existing one.


We are not adding extra parameter, we are introducing new function
that is a clone of another StartListening function with a version
suffix '11' in its name and with an extra parameter.

Correct. We changed behavior of StartListening function and 1.1
transport shouldn't care about old one.

i.e. when we document 1.1 interface we describe the only function
StartListening(env, address, actualAddress, allow)
that have to be placed to the StartListening11 slot.


Back in 2015 I proposed to separate interfaces entirely (see webrev.04),
but we (Alan?) decided that it's an overkill.


The original StartListening function is being removed.
It is much simpler to introduce new function AllowPeers(char* peers)
with the same parameter.

This separate function have to be called explicitly before we start
listening, It is extra communication step. IMHO, not obvious one.

So I would prefer to keep StartListening11

-Dmitry


On 2017-05-10 12:37, serguei.spit...@oracle.com wrote:

Dmitry,

Thank you a lot for the detailed reply!


On 5/10/17 01:10, Dmitry Samersoff wrote:

Serguei,

Please see my comments in-line.


On 2017-05-10 00:42, serguei.spit...@oracle.com wrote:

Hi Dmitry,


I'd like to resolve my questions before the upcoming design discussion
on Thu.


http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html




(0) The design description from the bug report tells:

> Than we change a negotiation protocol between JDWP and transport.
> We pass maximal supported version to transport initialization
routine and expect transport actual version to be returned.

The modified negotiation protocol adds extra complexity.
What is a motivation behind this?
Is it really necessary for the transport library to return an actual
version instead of rejecting the unmatched version?
I do not see it is really used in the webrev.15 implementation.

Transport have to return it's actual version in order to allow agent
to perform appropriate action.

see libjdwp/transport.c:526

This requirement adds extra complexity to the rules (transport
negotiation protocol).
It is not really necessary.
The loadTransport() already does a lookup of a version that is accepted
(not rejected) by the transport library and can save that version.
The transport_startTransport() then should use the version found by the
loadTransport().



Today it's just a selection of proper API call but in a future it might
be too-old-transport-error or deprecation warning or security warning or
something else.

I do not understand this reason for adding more complexity.
It seems, there should not be any issues in the future with rejecting
all unsupported versions by the transport library.
However, it will be even more simple if one transport library API could
support/accept all possible versions (see my alternate suggestion below).



(1) The following change in the jdwp transport library will reject
theJDWPTRANSPORT_VERSION_1_0 as it is below
  the version JDWPTRANSPORT_VERSION_1_1, but will except any version
above the JDWPTRANSPORT_VERSION_1_1
  (with providing/returning the actual transport version):

   jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
- jint version, jdwpTransportEnv** result)
+ jint version, void** env)
   {
- if (version != JDWPTRANSPORT_VERSION_1_0) {
+ if (version < JDWPTRANSPORT_VERSION_1_1) {
   return JNI_EVERSION;
   }


Te following change will also prevent supporting the 1_0 version of the
transport library:

- interface.StartListening = &socketTransport_startListening;
+ interface.StartListening = NULL;

libdt_socket/socketTransport.c is an implementation of 1.1 *transport*
it's not intended to run with 1.0 *backend*.

Why not?
It would simplifies things if the transport library (and its API) is
backward compatible.


i.e. 1.1 *backend* can run 1.1 and 1.0 transports but 1.1 *transport*
require 1.1 or greater backend.

This statement creates a confusion.
The truce is that the transport

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-11 Thread Robbin Ehn

Hi,

I find both your approaches acceptable regarding the version and 
StartListening11 vs AllowPeers.

Personally I prefer not using version instead using sizeof as syscall does.
E.g.
http://man7.org/linux/man-pages/man2/bind.2.html

But obviously this also require a new StartListeningXX method.

/Robbin

On 05/10/2017 05:27 PM, Dmitry Samersoff wrote:

Serguei,

Fixed minor issues (comments, netmask etc).
Added an error for attempt to use allow with an old transport.

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.17/

see also below.



I do not understand this reason for adding more complexity.
It seems, there should not be any issues in the future with rejecting
all unsupported versions by the transport library.


Added a diagram explaining transport version negotiation to CR. I use
future versions (1.3; 1.4; 1.5) because all this versioning staff has a
long term goal and allow us to develop better transport without breaking
existing one.


We are not adding extra parameter, we are introducing new function
that is a clone of another StartListening function with a version
suffix '11' in its name and with an extra parameter.


Correct. We changed behavior of StartListening function and 1.1
transport shouldn't care about old one.

i.e. when we document 1.1 interface we describe the only function
StartListening(env, address, actualAddress, allow)
that have to be placed to the StartListening11 slot.


Back in 2015 I proposed to separate interfaces entirely (see webrev.04),
but we (Alan?) decided that it's an overkill.


The original StartListening function is being removed.
It is much simpler to introduce new function AllowPeers(char* peers)
with the same parameter.


This separate function have to be called explicitly before we start
listening, It is extra communication step. IMHO, not obvious one.

So I would prefer to keep StartListening11

-Dmitry


On 2017-05-10 12:37, serguei.spit...@oracle.com wrote:

Dmitry,

Thank you a lot for the detailed reply!


On 5/10/17 01:10, Dmitry Samersoff wrote:

Serguei,

Please see my comments in-line.


On 2017-05-10 00:42, serguei.spit...@oracle.com wrote:

Hi Dmitry,


I'd like to resolve my questions before the upcoming design discussion
on Thu.


http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html




(0) The design description from the bug report tells:

> Than we change a negotiation protocol between JDWP and transport.
> We pass maximal supported version to transport initialization
routine and expect transport actual version to be returned.

The modified negotiation protocol adds extra complexity.
What is a motivation behind this?
Is it really necessary for the transport library to return an actual
version instead of rejecting the unmatched version?
I do not see it is really used in the webrev.15 implementation.

Transport have to return it's actual version in order to allow agent
to perform appropriate action.

see libjdwp/transport.c:526


This requirement adds extra complexity to the rules (transport
negotiation protocol).
It is not really necessary.
The loadTransport() already does a lookup of a version that is accepted
(not rejected) by the transport library and can save that version.
The transport_startTransport() then should use the version found by the
loadTransport().



Today it's just a selection of proper API call but in a future it might
be too-old-transport-error or deprecation warning or security warning or
something else.


I do not understand this reason for adding more complexity.
It seems, there should not be any issues in the future with rejecting
all unsupported versions by the transport library.
However, it will be even more simple if one transport library API could
support/accept all possible versions (see my alternate suggestion below).



(1) The following change in the jdwp transport library will reject
theJDWPTRANSPORT_VERSION_1_0 as it is below
  the version JDWPTRANSPORT_VERSION_1_1, but will except any version
above the JDWPTRANSPORT_VERSION_1_1
  (with providing/returning the actual transport version):

   jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
- jint version, jdwpTransportEnv** result)
+ jint version, void** env)
   {
- if (version != JDWPTRANSPORT_VERSION_1_0) {
+ if (version < JDWPTRANSPORT_VERSION_1_1) {
   return JNI_EVERSION;
   }


Te following change will also prevent supporting the 1_0 version of the
transport library:

- interface.StartListening = &socketTransport_startListening;
+ interface.StartListening = NULL;

libdt_socket/socketTransport.c is an implementation of 1.1 *transport*
it's not intended to run with 1.0 *backend*.


Why not?
It would simplifies things if the transport library (and its API) is
backward compatible.


i.e. 1.1 *backend* can run 1.1 and 1.0 transports but 1.1 *transport*
require 1.1 or greater backend.


This statement creat

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-10 Thread Dmitry Samersoff
Serguei,

Fixed minor issues (comments, netmask etc).
Added an error for attempt to use allow with an old transport.

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.17/

see also below.


> I do not understand this reason for adding more complexity.
> It seems, there should not be any issues in the future with rejecting
> all unsupported versions by the transport library.

Added a diagram explaining transport version negotiation to CR. I use
future versions (1.3; 1.4; 1.5) because all this versioning staff has a
long term goal and allow us to develop better transport without breaking
existing one.

> We are not adding extra parameter, we are introducing new function
> that is a clone of another StartListening function with a version
> suffix '11' in its name and with an extra parameter.

Correct. We changed behavior of StartListening function and 1.1
transport shouldn't care about old one.

i.e. when we document 1.1 interface we describe the only function
StartListening(env, address, actualAddress, allow)
that have to be placed to the StartListening11 slot.


Back in 2015 I proposed to separate interfaces entirely (see webrev.04),
but we (Alan?) decided that it's an overkill.

> The original StartListening function is being removed.
> It is much simpler to introduce new function AllowPeers(char* peers)
> with the same parameter.

This separate function have to be called explicitly before we start
listening, It is extra communication step. IMHO, not obvious one.

So I would prefer to keep StartListening11

-Dmitry


On 2017-05-10 12:37, serguei.spit...@oracle.com wrote:
> Dmitry,
> 
> Thank you a lot for the detailed reply!
> 
> 
> On 5/10/17 01:10, Dmitry Samersoff wrote:
>> Serguei,
>>
>> Please see my comments in-line.
>>
>>
>> On 2017-05-10 00:42, serguei.spit...@oracle.com wrote:
>>> Hi Dmitry,
>>>
>>>
>>> I'd like to resolve my questions before the upcoming design discussion
>>> on Thu.
>>>
>>>
>>> http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html
>>>
>>>
>>>
>>>
>>> (0) The design description from the bug report tells:
>>>
>>>> Than we change a negotiation protocol between JDWP and transport.
>>>> We pass maximal supported version to transport initialization
>>> routine and expect transport actual version to be returned.
>>>
>>>The modified negotiation protocol adds extra complexity.
>>>What is a motivation behind this?
>>>Is it really necessary for the transport library to return an actual
>>> version instead of rejecting the unmatched version?
>>>I do not see it is really used in the webrev.15 implementation.
>> Transport have to return it's actual version in order to allow agent
>> to perform appropriate action.
>>
>> see libjdwp/transport.c:526
> 
> This requirement adds extra complexity to the rules (transport
> negotiation protocol).
> It is not really necessary.
> The loadTransport() already does a lookup of a version that is accepted
> (not rejected) by the transport library and can save that version.
> The transport_startTransport() then should use the version found by the
> loadTransport().
> 
> 
>> Today it's just a selection of proper API call but in a future it might
>> be too-old-transport-error or deprecation warning or security warning or
>> something else.
> 
> I do not understand this reason for adding more complexity.
> It seems, there should not be any issues in the future with rejecting
> all unsupported versions by the transport library.
> However, it will be even more simple if one transport library API could
> support/accept all possible versions (see my alternate suggestion below).
> 
> 
>>> (1) The following change in the jdwp transport library will reject
>>> theJDWPTRANSPORT_VERSION_1_0 as it is below
>>>  the version JDWPTRANSPORT_VERSION_1_1, but will except any version
>>> above the JDWPTRANSPORT_VERSION_1_1
>>>  (with providing/returning the actual transport version):
>>>
>>>   jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
>>> - jint version, jdwpTransportEnv** result)
>>> + jint version, void** env)
>>>   {
>>> - if (version != JDWPTRANSPORT_VERSION_1_0) {
>>> + if (version < JDWPTRANSPORT_VERSION_1_1) {
>>>   return JNI_EVERSION;
>>>   }
>>>
>>>
>>> Te following change will also prevent supporting the 1_0 version of the
>>> transport library:
>>>
>>> - interface.StartListening = &socketTransport_startListening;
>>> + interface.StartListening = NULL;
>> libdt_socket/socketTransport.c is an implementation of 1.1 *transport*
>> it's not intended to run with 1.0 *backend*.
> 
> Why not?
> It would simplifies things if the transport library (and its API) is
> backward compatible.
> 
>> i.e. 1.1 *backend* can run 1.1 and 1.0 transports but 1.1 *transport*
>> require 1.1 or greater backend.
> 
> This statement creates a confusion.
> The truce is that the transport library can support some number of
> versions.
> 

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-10 Thread serguei.spit...@oracle.com

Dmitry,

Please, see one correction below.



On 5/10/17 02:37, serguei.spit...@oracle.com wrote:

Dmitry,

Thank you a lot for the detailed reply!


On 5/10/17 01:10, Dmitry Samersoff wrote:

Serguei,

Please see my comments in-line.


On 2017-05-10 00:42, serguei.spit...@oracle.com wrote:

Hi Dmitry,


I'd like to resolve my questions before the upcoming design discussion
on Thu.


http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html 





(0) The design description from the bug report tells:

   > Than we change a negotiation protocol between JDWP and transport.
   > We pass maximal supported version to transport initialization
routine and expect transport actual version to be returned.

   The modified negotiation protocol adds extra complexity.
   What is a motivation behind this?
   Is it really necessary for the transport library to return an actual
version instead of rejecting the unmatched version?
   I do not see it is really used in the webrev.15 implementation.

Transport have to return it's actual version in order to allow agent
to perform appropriate action.

see libjdwp/transport.c:526


This requirement adds extra complexity to the rules (transport 
negotiation protocol).

It is not really necessary.
The loadTransport() already does a lookup of a version that is accepted
(not rejected) by the transport library and can save that version.
The transport_startTransport() then should use the version found by 
the loadTransport().




Today it's just a selection of proper API call but in a future it might
be too-old-transport-error or deprecation warning or security warning or
something else.


I do not understand this reason for adding more complexity.
It seems, there should not be any issues in the future with rejecting
all unsupported versions by the transport library.
However, it will be even more simple if one transport library API could
support/accept all possible versions (see my alternate suggestion below).



(1) The following change in the jdwp transport library will reject
theJDWPTRANSPORT_VERSION_1_0 as it is below
 the version JDWPTRANSPORT_VERSION_1_1, but will except any version
above the JDWPTRANSPORT_VERSION_1_1
 (with providing/returning the actual transport version):

  jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
- jint version, jdwpTransportEnv** result)
+ jint version, void** env)
  {
- if (version != JDWPTRANSPORT_VERSION_1_0) {
+ if (version < JDWPTRANSPORT_VERSION_1_1) {
  return JNI_EVERSION;
  }


Te following change will also prevent supporting the 1_0 version of the
transport library:

- interface.StartListening = &socketTransport_startListening;
+ interface.StartListening = NULL;

libdt_socket/socketTransport.c is an implementation of 1.1 *transport*
it's not intended to run with 1.0 *backend*.


Why not?
It would simplifies things if the transport library (and its API) is 
backward compatible.



i.e. 1.1 *backend* can run 1.1 and 1.0 transports but 1.1 *transport*
require 1.1 or greater backend.


This statement creates a confusion.
The truce is that the transport library can support some number of 
versions.

The latest supported version can satisfy the agent if it supports it.


see: libjdwp/transport.c:206 for version logic on backend (agent) side


The logic at L206 does not require the transport library to return its 
version.

It will work Ok if the library rejects unsupported versions.


I'd suggest the following alternate change to the transport API 
allowing

to support
both old and new versions at the same time (it would simplify the
negotiation rules):
   - Add new function:
   jdwpTransportError AllowPeers(const char* peers);

   - Keep the original StartListening function.
 The function uses the allowed peers data if it was previously 
cached

by the AllowPeers().

   - It seems, the alternate approach does not require adding the
extra_data with version.
 But if there is still a real need to get the transport API version
then it'd better
 to introduce a function named GetTransportVersion() or
JDWP_TransportVersion().
 This would allow to encapsulate any extra_data that is 
necessary in

such a case.

 From pure JDWP hardening point of view we can just add extra parameter
*allow* to existing StartListening(). Caller is responsible for stack
consistency so old transport continues to work.


We are not adding extra parameter, we are introducing new function
that is a clone of another StartListening function with a version
suffix '11' in its name and with an extra parameter.
The original StartListening function is being removed.


A correction: Not removed but nulled out.
Do I get it right?


Thanks,
Serguei



It is much simpler to introduce new function AllowPeers(char* peers)
with the same parameter.
The original StartListening function works as before.
The updated API can support both versions 1_0 and 1_1.

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-10 Thread serguei.spit...@oracle.com

Dmitry,

Thank you a lot for the detailed reply!


On 5/10/17 01:10, Dmitry Samersoff wrote:

Serguei,

Please see my comments in-line.


On 2017-05-10 00:42, serguei.spit...@oracle.com wrote:

Hi Dmitry,


I'd like to resolve my questions before the upcoming design discussion
on Thu.


http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html



(0) The design description from the bug report tells:

   > Than we change a negotiation protocol between JDWP and transport.
   > We pass maximal supported version to transport initialization
routine and expect transport actual version to be returned.

   The modified negotiation protocol adds extra complexity.
   What is a motivation behind this?
   Is it really necessary for the transport library to return an actual
version instead of rejecting the unmatched version?
   I do not see it is really used in the webrev.15 implementation.

Transport have to return it's actual version in order to allow agent
to perform appropriate action.

see libjdwp/transport.c:526


This requirement adds extra complexity to the rules (transport 
negotiation protocol).

It is not really necessary.
The loadTransport() already does a lookup of a version that is accepted
(not rejected) by the transport library and can save that version.
The transport_startTransport() then should use the version found by the 
loadTransport().




Today it's just a selection of proper API call but in a future it might
be too-old-transport-error or deprecation warning or security warning or
something else.


I do not understand this reason for adding more complexity.
It seems, there should not be any issues in the future with rejecting
all unsupported versions by the transport library.
However, it will be even more simple if one transport library API could
support/accept all possible versions (see my alternate suggestion below).



(1) The following change in the jdwp transport library will reject
theJDWPTRANSPORT_VERSION_1_0 as it is below
 the version JDWPTRANSPORT_VERSION_1_1, but will except any version
above the JDWPTRANSPORT_VERSION_1_1
 (with providing/returning the actual transport version):

  jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
- jint version, jdwpTransportEnv** result)
+ jint version, void** env)
  {
- if (version != JDWPTRANSPORT_VERSION_1_0) {
+ if (version < JDWPTRANSPORT_VERSION_1_1) {
  return JNI_EVERSION;
  }


Te following change will also prevent supporting the 1_0 version of the
transport library:

- interface.StartListening = &socketTransport_startListening;
+ interface.StartListening = NULL;

libdt_socket/socketTransport.c is an implementation of 1.1 *transport*
it's not intended to run with 1.0 *backend*.


Why not?
It would simplifies things if the transport library (and its API) is 
backward compatible.



i.e. 1.1 *backend* can run 1.1 and 1.0 transports but 1.1 *transport*
require 1.1 or greater backend.


This statement creates a confusion.
The truce is that the transport library can support some number of versions.
The latest supported version can satisfy the agent if it supports it.


see: libjdwp/transport.c:206 for version logic on backend (agent) side


The logic at L206 does not require the transport library to return its 
version.

It will work Ok if the library rejects unsupported versions.



I'd suggest the following alternate change to the transport API allowing
to support
both old and new versions at the same time (it would simplify the
negotiation rules):
   - Add new function:
   jdwpTransportError AllowPeers(const char* peers);

   - Keep the original StartListening function.
 The function uses the allowed peers data if it was previously cached
by the AllowPeers().

   - It seems, the alternate approach does not require adding the
extra_data with version.
 But if there is still a real need to get the transport API version
then it'd better
 to introduce a function named GetTransportVersion() or
JDWP_TransportVersion().
 This would allow to encapsulate any extra_data that is necessary in
such a case.

 From pure JDWP hardening point of view we can just add extra parameter
*allow* to existing StartListening(). Caller is responsible for stack
consistency so old transport continues to work.


We are not adding extra parameter, we are introducing new function
that is a clone of another StartListening function with a version
suffix '11' in its name and with an extra parameter.
The original StartListening function is being removed.
It is much simpler to introduce new function AllowPeers(char* peers)
with the same parameter.
The original StartListening function works as before.
The updated API can support both versions 1_0 and 1_1.



But my goal was to create a versioning in JDWP agent -> transport
relations that was missed in initial JDWP design. Further, more
complicated, changes (IPv6 support, UDS sockets support etc)

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-10 Thread Dmitry Samersoff
Serguei,

Please see my comments in-line.


On 2017-05-10 00:42, serguei.spit...@oracle.com wrote:
> Hi Dmitry,
> 
> 
> I'd like to resolve my questions before the upcoming design discussion
> on Thu.
> 
> 
> http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html
> 
> 
> 
> (0) The design description from the bug report tells:
> 
>   > Than we change a negotiation protocol between JDWP and transport.
>   > We pass maximal supported version to transport initialization
> routine and expect transport actual version to be returned.
> 
>   The modified negotiation protocol adds extra complexity.
>   What is a motivation behind this?
>   Is it really necessary for the transport library to return an actual
> version instead of rejecting the unmatched version?
>   I do not see it is really used in the webrev.15 implementation.

Transport have to return it's actual version in order to allow agent
to perform appropriate action.

see libjdwp/transport.c:526

Today it's just a selection of proper API call but in a future it might
be too-old-transport-error or deprecation warning or security warning or
something else.

> (1) The following change in the jdwp transport library will reject
> theJDWPTRANSPORT_VERSION_1_0 as it is below
> the version JDWPTRANSPORT_VERSION_1_1, but will except any version
> above the JDWPTRANSPORT_VERSION_1_1
> (with providing/returning the actual transport version):
> 
>  jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
> - jint version, jdwpTransportEnv** result)
> + jint version, void** env)
>  {
> - if (version != JDWPTRANSPORT_VERSION_1_0) {
> + if (version < JDWPTRANSPORT_VERSION_1_1) {
>  return JNI_EVERSION;
>  }
> 
> 
> Te following change will also prevent supporting the 1_0 version of the
> transport library:
> 
> - interface.StartListening = &socketTransport_startListening;
> + interface.StartListening = NULL;

libdt_socket/socketTransport.c is an implementation of 1.1 *transport*
it's not intended to run with 1.0 *backend*.

i.e. 1.1 *backend* can run 1.1 and 1.0 transports but 1.1 *transport*
require 1.1 or greater backend.

see: libjdwp/transport.c:206 for version logic on backend (agent) side

> I'd suggest the following alternate change to the transport API allowing
> to support
> both old and new versions at the same time (it would simplify the
> negotiation rules):
>   - Add new function:
>   jdwpTransportError AllowPeers(const char* peers);
> 
>   - Keep the original StartListening function.
> The function uses the allowed peers data if it was previously cached
> by the AllowPeers().
> 
>   - It seems, the alternate approach does not require adding the
> extra_data with version.
> But if there is still a real need to get the transport API version
> then it'd better
> to introduce a function named GetTransportVersion() or
> JDWP_TransportVersion().
> This would allow to encapsulate any extra_data that is necessary in
> such a case.

>From pure JDWP hardening point of view we can just add extra parameter
*allow* to existing StartListening(). Caller is responsible for stack
consistency so old transport continues to work.

But my goal was to create a versioning in JDWP agent -> transport
relations that was missed in initial JDWP design. Further, more
complicated, changes (IPv6 support, UDS sockets support etc) require
this logic.

We have a structure jdwpTransportNativeInterface with a fixed set of
functions (see jdwpTransport.h:153). To add any new function to this
structure we have to create a method to detect presence of this
function. So we can't use GetTransportVersion().

With as separate AllowPeer() function nobody remind an agent writer that
they should use it, but extra parameter makes api changes and
requirements clear visible (up to compiler warning).

Also I'm against of changing behavior of existing function.


> (2) The following error messages miss the actual IP address or mask that
> was found to be illegal:
> 
> 383 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid ip
> address for allow"); 392
> RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid netmask for
> allow");

Other parameter parsing functions (e.g. "invalid port number specified"
at 274) doesn't explain what parameter is bad.
  I think typical allow would have one or two entry, so verbose error
message is not worth significant complication of parsing code.

I would prefer to leave it as is.


> (3) A suggestion on the following:
> 
> 377 uint32_t mask = 0x; 400 mask = 0x; // reset mask
> 
>  I'd suggest a more explicit approach instead of the L400 for a better
> clarity:
> 
> 386 if (*s == '/') {
> 387 // netmask specified
> 388 s = mask_s2u(s + 1, &mask);
> 389 if (*(s-1) == '/') {
> 390 // Input is not consumed, something bad happens
> 391 _peers_cnt = 0;
> 392 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid net

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-09 Thread serguei.spit...@oracle.com

(The formatting is broken in my reply.
I've changed my Zhunderbird 'Send Options' to avoid this in the future.
I tried to fix the formatting below.)

Hi Dmitry,


I'd like to resolve my questions before the upcoming design
discussion on Thu.


http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html


(0) The design description from the bug report tells:

  > Than we change a negotiation protocol between JDWP and transport.
  > We pass maximal supported version to transport initialization
  > routine and expect transport actual version to be returned.

  The modified negotiation protocol adds extra complexity.
  What is a motivation behind this?
  Is it really necessary for the transport library to return an actual
  version instead of rejecting the unmatched version?
  I do not see it is really used in the webrev.15 implementation.


(1) The following change in the jdwp transport library will reject
theJDWPTRANSPORT_VERSION_1_0 as it is below
the version JDWPTRANSPORT_VERSION_1_1, but will except any version
above the JDWPTRANSPORT_VERSION_1_1
(with providing/returning the actual transport version):

 jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
- jint version, jdwpTransportEnv** result)
+ jint version, void** env)
 {
- if (version != JDWPTRANSPORT_VERSION_1_0) {
+ if (version < JDWPTRANSPORT_VERSION_1_1) {
 return JNI_EVERSION;
 }


Te following change will also prevent supporting the 1_0 version of the
transport library:

- interface.StartListening = &socketTransport_startListening;
+ interface.StartListening = NULL;


I'd suggest the following alternate change to the transport API allowing
to support both old and new versions at the same time (it would simplify
the negotiation rules):
  - Add new function:
  jdwpTransportError AllowPeers(const char* peers);

  - Keep the original StartListening function.
The function uses the allowed peers data if it was previously
cached by the AllowPeers().

  - It seems, the alternate approach does not require adding the
extra_data with version.
But if there is still a real need to get the transport API version
then it'd better to introduce a function named GetTransportVersion()
or JDWP_TransportVersion().
This would allow to encapsulate any extra_data that is necessary
in such a case.


(2) The following error messages miss the actual IP address or mask that
was found to be illegal:

383 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid ip address for 
allow");
392 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid netmask for 
allow");

(3) A suggestion on the following:

377 uint32_t mask = 0x; 400 mask = 0x; // reset mask

 I'd suggest a more explicit approach instead of the L400 for a better clarity:

386 if (*s == '/') {
387 // netmask specified
388 s = mask_s2u(s + 1, &mask);
389 if (*(s-1) == '/') {
390 // Input is not consumed, something bad happens
391 _peers_cnt = 0;
392 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid netmask for 
allow");
393 }
394 } else {
mask = 0x;
}


http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libjdwp/transport.c.udiff.html

(4) Some confusion with the fragment and its comment:

+
+ /* Pass the latest supported version,
+ * expect actual transport version in t->extra_data->version
+ */
+ ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_1, &t);
+ if (ver == JNI_EVERSION) {
  ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_0, &t);
+ // Special handling for versionless transports
+ info->transportVersion = JDWPTRANSPORT_VERSION_1_0;
+ }
+ else {
+ info->transportVersion = (*t)->extra_data->version;
+ }
+

The term "latest supported version" is ambiguous in this context.
Do you mean, supported by the JDWP back-end or by the agent library?
Also, it is not clear in what circumstances the agent library would
support the version 1_0 only.
The JDWP back-end is always coupled with the socket transport library, isn't it?
Is it because the libdt_shmem library can be used on Windows or because a
different native library path can be used?
Could you explain a little bit?

As we see in (1) above the actual transport version can be different
from requested only if the requested version is above the latest
supported by the transport library.
Otherwise, the version is matched or the JNI_EVERSION is returned.
The subsequent call to the OnLoad function can succeed only if the library
supports just the version 1_0.

The returned 'ver' is not checked for an error after the second *OnLoad call.



(5) Memory allocation for the info->allow filed
is needed only for the transport version 1_1:

+ if (allow != NULL) {
+ info->allow = jvmtiAllocate((int)strlen(allow)+1);
+ if (info->allow == NULL

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-05-09 Thread serguei.spit...@oracle.com

Hi Dmitry,


I'd like to resolve my questions before the upcoming design discussion 
on Thu.



http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html


(0) The design description from the bug report tells:

  > Than we change a negotiation protocol between JDWP and transport.
  > We pass maximal supported version to transport initialization 
routine and expect transport actual version to be returned.


  The modified negotiation protocol adds extra complexity.
  What is a motivation behind this?
  Is it really necessary for the transport library to return an actual 
version instead of rejecting the unmatched version?

  I do not see it is really used in the webrev.15 implementation.


(1) The following change in the jdwp transport library will reject 
theJDWPTRANSPORT_VERSION_1_0 as it is below
the version JDWPTRANSPORT_VERSION_1_1, but will except any version 
above the JDWPTRANSPORT_VERSION_1_1

(with providing/returning the actual transport version):

 jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
- jint version, jdwpTransportEnv** result)
+ jint version, void** env)
 {
- if (version != JDWPTRANSPORT_VERSION_1_0) {
+ if (version < JDWPTRANSPORT_VERSION_1_1) {
 return JNI_EVERSION;
 }


Te following change will also prevent supporting the 1_0 version of the 
transport library:


- interface.StartListening = &socketTransport_startListening;
+ interface.StartListening = NULL;



I'd suggest the following alternate change to the transport API allowing 
to support
both old and new versions at the same time (it would simplify the 
negotiation rules):

  - Add new function:
  jdwpTransportError AllowPeers(const char* peers);

  - Keep the original StartListening function.
The function uses the allowed peers data if it was previously 
cached by the AllowPeers().


  - It seems, the alternate approach does not require adding the 
extra_data with version.
But if there is still a real need to get the transport API version 
then it'd better
to introduce a function named GetTransportVersion() or 
JDWP_TransportVersion().
This would allow to encapsulate any extra_data that is necessary in 
such a case.



(2) The following error messages miss the actual IP address or mask that 
was found to be illegal:


383 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid ip 
address for allow"); 392 
RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid netmask for 
allow");


(3) A suggestion on the following:

377 uint32_t mask = 0x; 400 mask = 0x; // reset mask

 I'd suggest a more explicit approach instead of the L400 for a better 
clarity:


386 if (*s == '/') {
387 // netmask specified
388 s = mask_s2u(s + 1, &mask);
389 if (*(s-1) == '/') {
390 // Input is not consumed, something bad happens
391 _peers_cnt = 0;
392 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid netmask 
for allow");

393 }
394 } else { mask = 0x; }

http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libjdwp/transport.c.udiff.html 
(4) Some confusion with the fragment and its comment:


+
+ /* Pass the latest supported version,
+ * expect actual transport version in t->extra_data->version
+ */
+ ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_1, &t);
+ if (ver == JNI_EVERSION) {
 ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_0, &t);
+ // Special handling for versionless transports
+ info->transportVersion = JDWPTRANSPORT_VERSION_1_0;
+ }
+ else {
+ info->transportVersion = (*t)->extra_data->version;
+ }
+

The term "latest supported version" is ambiguous in this context. Do you 
mean, supported by the JDWP back-end or by the agent library? Also, it 
is not clear in what circumstances the agent library would support the 
version 1_0 only. The JDWP back-end is always coupled with the socket 
transport library, isn't it? Is it because the libdt_shmem library can 
be used on Windows or because a different native library path can be 
used? Could you explain a little bit? As we see in (1) above the actual 
transport version can be different from requested only if the requested 
version is above the latest supported by the transport library. 
Otherwise, the version is matched or the JNI_EVERSION is returned. The 
subsequent call to the OnLoad function can succeed only if the library 
supports just the version 1_0. (5) Memory allocation for the info->allow 
field is needed only for the transport version 1_1:


+ if (allow != NULL) {
+ info->allow = jvmtiAllocate((int)strlen(allow)+1);
+ if (info->allow == NULL) {
+ serror = JDWP_ERROR(OUT_OF_MEMORY);
+ goto handleError;
+ }
+ (void)strcpy(info->allow, allow);
+ }

(6) There is no handling for the condition when the *allow* parameter is 
passed but the transport version is 1_0 (which does not support the 
*allow* parameter):


+ /* Interface version

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-04-19 Thread Robbin Ehn

Hi Dmitry, sorry for the delay.

Yes thanks, everything seems to work.

Code looks reasonable.

/Robbin

On 03/29/2017 05:10 PM, Dmitry Samersoff wrote:

Robbin,


One follow-up issue is that if you start suspended
and than connect with
an unallowed client the JVM starts and executes the program.


Fixed.

see http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.15

-Dmitry

On 2017-03-16 15:59, Robbin Ehn wrote:

Hi Dmitry, thanks for the update.

One follow-up issue is that if you start suspended and than connect with
an unallowed client the JVM starts and executes the program.
Simple program prints "Hello".

[rehn@rehn-ws vanilla-hs]$ java
-agentlib:jdwp=transport=dt_socket,server=y,suspend=y,address=*:,allow=1.2.3.0/32
-cp . H
Listening for transport dt_socket at address: 
ERROR: Peer not allowed to connect
Listening for transport dt_socket at address: 
Hello

I think it would be good if the VM stayed suspended when an unallowed
client connects.

Thanks, Robbin

On 03/13/2017 08:07 PM, Dmitry Samersoff wrote:

Robbin,

Please, see:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.11


1:
So connecting with an unallowed client terminates the VM.


Fixed.


2:
Starting with an bad allow filter terminates the VM when connecting a
client.


Moved allowed parameter (and parser call) to StartListening.

-Dmitry


On 2017-03-10 15:56, Robbin Ehn wrote:

Hi Dmitry,

I took a look at this, I have two practical issues:

1:
[rehn@rehn-ws dev]$ java
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.6.6.6

-cp runs ForEver
Listening for transport dt_socket at address: 
ERROR: transport error 202: peer not allowed to connect: Success
JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
error [transport.c:358]

So connecting with an unallowed client terminates the VM.

2:
[rehn@rehn-ws dev]$ java
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.BAD.6.6

-cp runs ForEver
Listening for transport dt_socket at address: 
ERROR: transport error 202: unable to parse list of allowed peers:
Success
JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
error [transport.c:358]

Starting with an bad allow filter terminates the VM when connecting a
client.


Connecting with an unallowed ip/port should not terminate the VM and we
should verify allow filter directly at startup.

Thanks

/Robbin

On 02/28/2017 10:41 AM, Dmitry Samersoff wrote:

Everybody,

Please review:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/

These changes introduce new parameter[1] of the socket transport -
allow. Users can explicitly specify a list of hosts that allowed to
connect to jdwp server and it's the second part of JDWP hardening[2].

No restrictions are applied by default now but I'll file a separate CR
to restrict list of allowed peers to localhost by default.

Also these changes implement versioning for jdwp transport and therefor
simplify feature development of jdwp.


1. Example command line:

-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
address=*,allow="127.0.0.0/8;192.168.0.0/24"

Possible values for allow parameter:
  *   - accept connections from everywhere.
  N.N.N.N - accept connections from this IP address only
  N.N.N.N/nn  - accept connections from particular ip subnet



2. JDK-8052136 JDWP hardening

-Dmitry









Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-04-06 Thread Dmitry Samersoff
Serguei,

(resending lost e-mail)

Please, see:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.15/

Nits fixed.

> It is not clear why do you
> need the static variable transportVersion and this dance with it.

We have to keep transport version in the global variable because

void *reserved1; (_extra_data in new code)

is not initialized by old transport and we can't rely on it's content
but have to keep transport version between subsequent connections.

I'd reorganized this part of code a bit for better readability.

-Dmitry

On 2017-03-17 12:20, serguei.spit...@oracle.com wrote:
> Dmitry,
> 
> 
> Some quick comments on the webrev.12.
> 
> 
> The style of comments must be /* */, not //.
> 
> 
> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/src/jdk.jdwp.agent/share/native/libjdwp/transport.c.frames.html
> 
> 
> 205 // Pass MAXIMAL supported version, expect actual transport version in
> 
>Would it better to replace 'MAXIMAL' with 'the latest' ?
> 
> 
> 516 // interface version 1.0 doesn't support versioning, so we have to
> 517 // a use global variable and set the version artifically.
> 518 // Use (*t)->extra_data->version directly when 1.0 is gone
> 
>   516: interface => Interface
>   517: Typo: a use => use
>   518: Dot is missed at the end.
> 
> 
> 33 static unsigned transportVersion = JDWPTRANSPORT_VERSION_1_0; ... 207
> ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_1, &t);
> 208 if (ver == JNI_EVERSION) {
>  209 ver = (*onLoad)(jvm, &callback,
> JDWPTRANSPORT_VERSION_1_0, &t);
> 210 // Special handling for versionless transports
> 211 info->transportVersion = JDWPTRANSPORT_VERSION_1_0;
> 212 }
> 213 else {
> 214 info->transportVersion = (*t)->extra_data->version;
> 215 } ...263 transportVersion = pTransportVersion; ... 459
> info->transportVersion = transportVersion; It is not clear why do you
> need the static variable transportVersion and this dance with it. It
> seems, the transport version is always enforced by the TransportOnLoad
> function anyway. At the line 459, you could just have:
> 459 info->transportVersion = JDWPTRANSPORT_VERSION_1_0; Thanks, Serguei
> 
> On 3/17/17 00:03, serguei.spit...@oracle.com wrote:
>> Hi Dmitry, On 3/15/17 00:56, Dmitry Samersoff wrote:
>>> Serguei,
 I still see the C .vs. C++ related change in the jdwpTransport.h. 
>>> done. http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/ 
>> Good. Thank you for the update!
>>> see also inline. On 2017-03-15 00:40, serguei.spit...@oracle.com wrote:
 Hi Dmitry, We already had a big review thread back in 2014 on this.
 I think, it is again going in the wrong order. First, I think, it is
 better to start from a CCC (or its equivalent, CSR). This will allow
 to focus on and sort out the changes in interface/behavior first
 before going into the implementation details. 
>>> CCC was filed and approved. The only reason I withdraw it - the fix
>>> didn't go to jdk9 but CCC tool doesn't have jdk10. CSR process is
>>> also not yet implemented. 
>> The CSR preview message from Joe is attached. My understanding is that
>> we can continue to use CCC. At some points the CCC process will be
>> moved to the CSR. The CCC is out of date now as it does not match the
>> webrev 12. Also, I do not like the addition of new function
>> StartListening11() next to StartListening(). Does it mean, that for
>> transport version 1.2 we might have more function clones with 12
>> suffix? Perhaps, we need something smarter here but I'm unsure yet
>> what it has to be.
 Second, I'd suggest to separate a couple of other things. I still
 see the C .vs. C++ related change in the jdwpTransport.h. It is
 better to leave it along for now as it was suggested in early review
 rounds. If you still want to fix it then it is better to file a
 separate bug that should include the JNI as well (as it was
 discussed with Alan before). 
>>> Do you mean?39 #ifdef __cplusplus40 extern "C" {41 #endif
>>> I'll add it back to avoid any confusion. 
>> Yes. I see you added it back in new version of webrev.
 Also, I'm thinking if it is a good idea to separate the transport
 versioning to an RFE. It would allow to focus on this aspect as
 necessary. In this case, the 8061228 will depend on the versioning.
 However, it is much more simple and can be resolved faster. 
>>> It's hard to test versioning code without implementation of new,
>>> VERSION_1_1 transport. Network part of 8061228 is simple and clear
>>> separated from versioning, so I would prefer to keep it together in
>>> one CR/one push. 
>> No pressure. I've got your point above. Thanks, Serguei
>>> Restriction turned off by default (I'll file separate CR to enable it
>>> later), so we have enough time to fix any issues that might come.
>>> -Dmitry
 Thanks, Serguei On 2/28/17 01:41, Dmitry Samersoff wrote:
> Everybody, Please review:
> http://cr.openjdk.java.net/~dsamersoff/JDK

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-04-06 Thread Dmitry Samersoff
Serguei,

1. New webrev with couple of issues addressed (see Robbin's e-mails):

 http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.15

2. We have to keep transport version in global variable because old
transport doesn't initialize reserved1 field and we are loosing version
information after first disconnect. i.e. if I remove this "dancing"
debugger is not able to connect second time.

I'd reorganized code a bit for better readability.

3. ccc tool doesn't have JDK10 so we can't go forward.

-Dmitry


On 2017-03-17 12:20, serguei.spit...@oracle.com wrote:
> Dmitry,
> 
> 
> Some quick comments on the webrev.12.
> 
> 
> The style of comments must be /* */, not //.
> 
> 
> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/src/jdk.jdwp.agent/share/native/libjdwp/transport.c.frames.html
> 
> 
> 205 // Pass MAXIMAL supported version, expect actual transport version in
> 
>Would it better to replace 'MAXIMAL' with 'the latest' ?
> 
> 
> 516 // interface version 1.0 doesn't support versioning, so we have to
> 517 // a use global variable and set the version artifically.
> 518 // Use (*t)->extra_data->version directly when 1.0 is gone
> 
>   516: interface => Interface
>   517: Typo: a use => use
>   518: Dot is missed at the end.
> 
> 
> 33 static unsigned transportVersion = JDWPTRANSPORT_VERSION_1_0; ... 207
> ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_1, &t);
> 208 if (ver == JNI_EVERSION) {
>  209 ver = (*onLoad)(jvm, &callback,
> JDWPTRANSPORT_VERSION_1_0, &t);
> 210 // Special handling for versionless transports
> 211 info->transportVersion = JDWPTRANSPORT_VERSION_1_0;
> 212 }
> 213 else {
> 214 info->transportVersion = (*t)->extra_data->version;
> 215 } ...263 transportVersion = pTransportVersion; ... 459
> info->transportVersion = transportVersion; It is not clear why do you
> need the static variable transportVersion and this dance with it. It
> seems, the transport version is always enforced by the TransportOnLoad
> function anyway. At the line 459, you could just have:
> 459 info->transportVersion = JDWPTRANSPORT_VERSION_1_0; Thanks, Serguei
> 
> On 3/17/17 00:03, serguei.spit...@oracle.com wrote:
>> Hi Dmitry, On 3/15/17 00:56, Dmitry Samersoff wrote:
>>> Serguei,
 I still see the C .vs. C++ related change in the jdwpTransport.h. 
>>> done. http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/ 
>> Good. Thank you for the update!
>>> see also inline. On 2017-03-15 00:40, serguei.spit...@oracle.com wrote:
 Hi Dmitry, We already had a big review thread back in 2014 on this.
 I think, it is again going in the wrong order. First, I think, it is
 better to start from a CCC (or its equivalent, CSR). This will allow
 to focus on and sort out the changes in interface/behavior first
 before going into the implementation details. 
>>> CCC was filed and approved. The only reason I withdraw it - the fix
>>> didn't go to jdk9 but CCC tool doesn't have jdk10. CSR process is
>>> also not yet implemented. 
>> The CSR preview message from Joe is attached. My understanding is that
>> we can continue to use CCC. At some points the CCC process will be
>> moved to the CSR. The CCC is out of date now as it does not match the
>> webrev 12. Also, I do not like the addition of new function
>> StartListening11() next to StartListening(). Does it mean, that for
>> transport version 1.2 we might have more function clones with 12
>> suffix? Perhaps, we need something smarter here but I'm unsure yet
>> what it has to be.
 Second, I'd suggest to separate a couple of other things. I still
 see the C .vs. C++ related change in the jdwpTransport.h. It is
 better to leave it along for now as it was suggested in early review
 rounds. If you still want to fix it then it is better to file a
 separate bug that should include the JNI as well (as it was
 discussed with Alan before). 
>>> Do you mean?39 #ifdef __cplusplus40 extern "C" {41 #endif
>>> I'll add it back to avoid any confusion. 
>> Yes. I see you added it back in new version of webrev.
 Also, I'm thinking if it is a good idea to separate the transport
 versioning to an RFE. It would allow to focus on this aspect as
 necessary. In this case, the 8061228 will depend on the versioning.
 However, it is much more simple and can be resolved faster. 
>>> It's hard to test versioning code without implementation of new,
>>> VERSION_1_1 transport. Network part of 8061228 is simple and clear
>>> separated from versioning, so I would prefer to keep it together in
>>> one CR/one push. 
>> No pressure. I've got your point above. Thanks, Serguei
>>> Restriction turned off by default (I'll file separate CR to enable it
>>> later), so we have enough time to fix any issues that might come.
>>> -Dmitry
 Thanks, Serguei On 2/28/17 01:41, Dmitry Samersoff wrote:
> Everybody, Please review:
> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/ These
>>>

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-29 Thread Dmitry Samersoff
Robbin,

> One follow-up issue is that if you start suspended
> and than connect with
> an unallowed client the JVM starts and executes the program.

Fixed.

see http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.15

-Dmitry

On 2017-03-16 15:59, Robbin Ehn wrote:
> Hi Dmitry, thanks for the update.
> 
> One follow-up issue is that if you start suspended and than connect with
> an unallowed client the JVM starts and executes the program.
> Simple program prints "Hello".
> 
> [rehn@rehn-ws vanilla-hs]$ java
> -agentlib:jdwp=transport=dt_socket,server=y,suspend=y,address=*:,allow=1.2.3.0/32
> -cp . H
> Listening for transport dt_socket at address: 
> ERROR: Peer not allowed to connect
> Listening for transport dt_socket at address: 
> Hello
> 
> I think it would be good if the VM stayed suspended when an unallowed
> client connects.
> 
> Thanks, Robbin
> 
> On 03/13/2017 08:07 PM, Dmitry Samersoff wrote:
>> Robbin,
>>
>> Please, see:
>>
>> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.11
>>
>>> 1:
>>> So connecting with an unallowed client terminates the VM.
>>
>> Fixed.
>>
>>> 2:
>>> Starting with an bad allow filter terminates the VM when connecting a
>>> client.
>>
>> Moved allowed parameter (and parser call) to StartListening.
>>
>> -Dmitry
>>
>>
>> On 2017-03-10 15:56, Robbin Ehn wrote:
>>> Hi Dmitry,
>>>
>>> I took a look at this, I have two practical issues:
>>>
>>> 1:
>>> [rehn@rehn-ws dev]$ java
>>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.6.6.6
>>>
>>> -cp runs ForEver
>>> Listening for transport dt_socket at address: 
>>> ERROR: transport error 202: peer not allowed to connect: Success
>>> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
>>> error [transport.c:358]
>>>
>>> So connecting with an unallowed client terminates the VM.
>>>
>>> 2:
>>> [rehn@rehn-ws dev]$ java
>>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.BAD.6.6
>>>
>>> -cp runs ForEver
>>> Listening for transport dt_socket at address: 
>>> ERROR: transport error 202: unable to parse list of allowed peers:
>>> Success
>>> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
>>> error [transport.c:358]
>>>
>>> Starting with an bad allow filter terminates the VM when connecting a
>>> client.
>>>
>>>
>>> Connecting with an unallowed ip/port should not terminate the VM and we
>>> should verify allow filter directly at startup.
>>>
>>> Thanks
>>>
>>> /Robbin
>>>
>>> On 02/28/2017 10:41 AM, Dmitry Samersoff wrote:
 Everybody,

 Please review:

 http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/

 These changes introduce new parameter[1] of the socket transport -
 allow. Users can explicitly specify a list of hosts that allowed to
 connect to jdwp server and it's the second part of JDWP hardening[2].

 No restrictions are applied by default now but I'll file a separate CR
 to restrict list of allowed peers to localhost by default.

 Also these changes implement versioning for jdwp transport and therefor
 simplify feature development of jdwp.


 1. Example command line:

 -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
 address=*,allow="127.0.0.0/8;192.168.0.0/24"

 Possible values for allow parameter:
   *   - accept connections from everywhere.
   N.N.N.N - accept connections from this IP address only
   N.N.N.N/nn  - accept connections from particular ip subnet



 2. JDK-8052136 JDWP hardening

 -Dmitry

>>
>>


-- 
Dmitry Samersoff
Oracle Java development team, Saint Petersburg, Russia
* I would love to change the world, but they won't give me the sources.


Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-17 Thread serguei.spit...@oracle.com

Dmitry,


Some quick comments on the webrev.12.


The style of comments must be /* */, not //.


http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/src/jdk.jdwp.agent/share/native/libjdwp/transport.c.frames.html

205 // Pass MAXIMAL supported version, expect actual transport version in

   Would it better to replace 'MAXIMAL' with 'the latest' ?


516 // interface version 1.0 doesn't support versioning, so we have to
517 // a use global variable and set the version artifically.
518 // Use (*t)->extra_data->version directly when 1.0 is gone

  516: interface => Interface
  517: Typo: a use => use
  518: Dot is missed at the end.


33 static unsigned transportVersion = JDWPTRANSPORT_VERSION_1_0; ... 207 
ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_1, &t);

208 if (ver == JNI_EVERSION) {
 209 ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_0, &t);
210 // Special handling for versionless transports
211 info->transportVersion = JDWPTRANSPORT_VERSION_1_0;
212 }
213 else {
214 info->transportVersion = (*t)->extra_data->version;
215 } ...263 transportVersion = pTransportVersion; ... 459 
info->transportVersion = transportVersion; It is not clear why do you 
need the static variable transportVersion and this dance with it. It 
seems, the transport version is always enforced by the TransportOnLoad 
function anyway. At the line 459, you could just have:

459 info->transportVersion = JDWPTRANSPORT_VERSION_1_0; Thanks, Serguei

On 3/17/17 00:03, serguei.spit...@oracle.com wrote:

Hi Dmitry, On 3/15/17 00:56, Dmitry Samersoff wrote:

Serguei,
I still see the C .vs. C++ related change in the jdwpTransport.h. 
done. http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/ 

Good. Thank you for the update!

see also inline. On 2017-03-15 00:40, serguei.spit...@oracle.com wrote:
Hi Dmitry, We already had a big review thread back in 2014 on this. 
I think, it is again going in the wrong order. First, I think, it is 
better to start from a CCC (or its equivalent, CSR). This will allow 
to focus on and sort out the changes in interface/behavior first 
before going into the implementation details. 
CCC was filed and approved. The only reason I withdraw it - the fix 
didn't go to jdk9 but CCC tool doesn't have jdk10. CSR process is 
also not yet implemented. 
The CSR preview message from Joe is attached. My understanding is that 
we can continue to use CCC. At some points the CCC process will be 
moved to the CSR. The CCC is out of date now as it does not match the 
webrev 12. Also, I do not like the addition of new function 
StartListening11() next to StartListening(). Does it mean, that for 
transport version 1.2 we might have more function clones with 12 
suffix? Perhaps, we need something smarter here but I'm unsure yet 
what it has to be.
Second, I'd suggest to separate a couple of other things. I still 
see the C .vs. C++ related change in the jdwpTransport.h. It is 
better to leave it along for now as it was suggested in early review 
rounds. If you still want to fix it then it is better to file a 
separate bug that should include the JNI as well (as it was 
discussed with Alan before). 
Do you mean?39 #ifdef __cplusplus40 extern "C" {41 #endif 
I'll add it back to avoid any confusion. 

Yes. I see you added it back in new version of webrev.
Also, I'm thinking if it is a good idea to separate the transport 
versioning to an RFE. It would allow to focus on this aspect as 
necessary. In this case, the 8061228 will depend on the versioning. 
However, it is much more simple and can be resolved faster. 
It's hard to test versioning code without implementation of new, 
VERSION_1_1 transport. Network part of 8061228 is simple and clear 
separated from versioning, so I would prefer to keep it together in 
one CR/one push. 

No pressure. I've got your point above. Thanks, Serguei
Restriction turned off by default (I'll file separate CR to enable it 
later), so we have enough time to fix any issues that might come. 
-Dmitry

Thanks, Serguei On 2/28/17 01:41, Dmitry Samersoff wrote:
Everybody, Please review: 
http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/ These 
changes introduce new parameter[1] of the socket transport - allow. 
Users can explicitly specify a list of hosts that allowed to 
connect to jdwp server and it's the second part of JDWP 
hardening[2]. No restrictions are applied by default now but I'll 
file a separate CR to restrict list of allowed peers to localhost 
by default. Also these changes implement versioning for jdwp 
transport and therefor simplify feature development of jdwp. 1. 
Example command line: 
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n, 
address=*,allow="127.0.0.0/8;192.168.0.0/24" Possible values for 
allow parameter: *   - accept connections from 
everywhere. N.N.N.N - accept connections from this IP 
address only N.N.N.N/nn  - accept connections from particular 
ip subnet 2. JDK-8052136 JDW

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-17 Thread serguei.spit...@oracle.com

Hi Dmitry,



On 3/15/17 00:56, Dmitry Samersoff wrote:

Serguei,


I still see the C .vs. C++ related change in the jdwpTransport.h.

done.

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/


Good.
Thank you for the update!




see also inline.

On 2017-03-15 00:40, serguei.spit...@oracle.com wrote:

Hi Dmitry,

We already had a big review thread back in 2014 on this.
I think, it is again going in the wrong order.

First, I think, it is better to start from a CCC (or its equivalent, CSR).
This will allow to focus on and sort out the changes in interface/behavior
first before going into the implementation details.

CCC was filed and approved. The only reason I withdraw it - the fix
didn't go to jdk9 but CCC tool doesn't have jdk10.

CSR process is also not yet implemented.


The CSR preview message from Joe is attached.
My understanding is that we can continue to use CCC.
At some points the CCC process will be moved to the CSR.

The CCC is out of date now as it does not match the webrev 12.
Also, I do not like the addition of new function StartListening11() next 
to StartListening().


Does it mean, that for transport version 1.2 we might have more function 
clones with 12 suffix?
Perhaps, we need something smarter here but I'm unsure yet what it has 
to be.




Second, I'd suggest to separate a couple of other things.
I still see the C .vs. C++ related change in the jdwpTransport.h.
It is better to leave it along for now as it was suggested in early
review rounds.
If you still want to fix it then it is better to file a separate bug that
should include the JNI as well (as it was discussed with Alan before).

Do you mean?

   39 #ifdef __cplusplus
   40 extern "C" {
   41 #endif

I'll add it back to avoid any confusion.


Yes. I see you added it back in new version of webrev.





Also, I'm thinking if it is a good idea to separate the transport
versioning to an RFE.
It would allow to focus on this aspect as necessary.
In this case, the 8061228 will depend on the versioning.
However, it is much more simple and can be resolved faster.

It's hard to test versioning code without implementation of
new, VERSION_1_1 transport.

Network part of 8061228 is simple and clear separated from versioning,
so I would prefer to keep it together in one CR/one push.


No pressure.
I've got your point above.


Thanks,
Serguei



Restriction turned off by default (I'll file separate CR to enable it
later), so we have enough time to fix any issues that might come.

-Dmitry



Thanks,
Serguei


On 2/28/17 01:41, Dmitry Samersoff wrote:

Everybody,

Please review:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/

These changes introduce new parameter[1] of the socket transport -
allow. Users can explicitly specify a list of hosts that allowed to
connect to jdwp server and it's the second part of JDWP hardening[2].

No restrictions are applied by default now but I'll file a separate CR
to restrict list of allowed peers to localhost by default.

Also these changes implement versioning for jdwp transport and therefor
simplify feature development of jdwp.


1. Example command line:

-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
address=*,allow="127.0.0.0/8;192.168.0.0/24"

Possible values for allow parameter:
*   - accept connections from everywhere.
N.N.N.N - accept connections from this IP address only
N.N.N.N/nn  - accept connections from particular ip subnet



2. JDK-8052136 JDWP hardening

-Dmitry





--- Begin Message ---

Hello,

The JDK organization has long been served by the ccc webapp at 
http://ccc.us.oracle.com. With the migration of bugs to JBS and the 
availability of a configurable JIRA system, other workflows can be 
supported by JBS as well, as seen in JEPs. As a continuation of this 
trend and to allow better integration across processes, the ccc process, 
with some adaptations, will soon be moved to JBS. After being moved to 
JBS, the process will also be externalized, usable and visible to JBS 
users who are not Oracle employees subject to the usual restrictions for 
confidential issues.


Initially ccc reviews for post-9 releases will be done in the new 
system. To avoid changing JCK and JCP-documentation processes 
mid-release, JDK 9 will continue to be run on the existing ccc system. 
After JDK 9 GA, there will be a high-fidelity bulk import of the old 
requests into the new system.


One of the adaptations of the ccc process is a new name "CSR" standing 
for "Compatibility and Specification Review." This new name is more 
evocative of the role the process plays and is easier to explain to new 
users.


The new "CSR" issue type is available for early preview on the JBS 
staging system:


https://bugs-stage.openjdk.java.net

To create a CSR for an issue, under the "More" menu select "Create CSR". 
This is similar to how a backport can be created manually. [1]


Thanks to Tony Squire implementing the JBS support for CSR.

More information about t

Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-16 Thread Robbin Ehn

Hi Dmitry, thanks for the update.

One follow-up issue is that if you start suspended and than connect with an 
unallowed client the JVM starts and executes the program.
Simple program prints "Hello".

[rehn@rehn-ws vanilla-hs]$ java 
-agentlib:jdwp=transport=dt_socket,server=y,suspend=y,address=*:,allow=1.2.3.0/32
 -cp . H
Listening for transport dt_socket at address: 
ERROR: Peer not allowed to connect
Listening for transport dt_socket at address: 
Hello

I think it would be good if the VM stayed suspended when an unallowed client 
connects.

Thanks, Robbin

On 03/13/2017 08:07 PM, Dmitry Samersoff wrote:

Robbin,

Please, see:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.11


1:
So connecting with an unallowed client terminates the VM.


Fixed.


2:
Starting with an bad allow filter terminates the VM when connecting a
client.


Moved allowed parameter (and parser call) to StartListening.

-Dmitry


On 2017-03-10 15:56, Robbin Ehn wrote:

Hi Dmitry,

I took a look at this, I have two practical issues:

1:
[rehn@rehn-ws dev]$ java
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.6.6.6
-cp runs ForEver
Listening for transport dt_socket at address: 
ERROR: transport error 202: peer not allowed to connect: Success
JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
error [transport.c:358]

So connecting with an unallowed client terminates the VM.

2:
[rehn@rehn-ws dev]$ java
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.BAD.6.6
-cp runs ForEver
Listening for transport dt_socket at address: 
ERROR: transport error 202: unable to parse list of allowed peers: Success
JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
error [transport.c:358]

Starting with an bad allow filter terminates the VM when connecting a
client.


Connecting with an unallowed ip/port should not terminate the VM and we
should verify allow filter directly at startup.

Thanks

/Robbin

On 02/28/2017 10:41 AM, Dmitry Samersoff wrote:

Everybody,

Please review:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/

These changes introduce new parameter[1] of the socket transport -
allow. Users can explicitly specify a list of hosts that allowed to
connect to jdwp server and it's the second part of JDWP hardening[2].

No restrictions are applied by default now but I'll file a separate CR
to restrict list of allowed peers to localhost by default.

Also these changes implement versioning for jdwp transport and therefor
simplify feature development of jdwp.


1. Example command line:

-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
address=*,allow="127.0.0.0/8;192.168.0.0/24"

Possible values for allow parameter:
  *   - accept connections from everywhere.
  N.N.N.N - accept connections from this IP address only
  N.N.N.N/nn  - accept connections from particular ip subnet



2. JDK-8052136 JDWP hardening

-Dmitry






Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-15 Thread Dmitry Samersoff
Serguei,

> I still see the C .vs. C++ related change in the jdwpTransport.h.

done.

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.12/

see also inline.

On 2017-03-15 00:40, serguei.spit...@oracle.com wrote:
> Hi Dmitry,
> 
> We already had a big review thread back in 2014 on this.
> I think, it is again going in the wrong order.
> 
> First, I think, it is better to start from a CCC (or its equivalent, CSR).
> This will allow to focus on and sort out the changes in interface/behavior
> first before going into the implementation details.

CCC was filed and approved. The only reason I withdraw it - the fix
didn't go to jdk9 but CCC tool doesn't have jdk10.

CSR process is also not yet implemented.

> Second, I'd suggest to separate a couple of other things.
> I still see the C .vs. C++ related change in the jdwpTransport.h.
> It is better to leave it along for now as it was suggested in early
> review rounds.
> If you still want to fix it then it is better to file a separate bug that
> should include the JNI as well (as it was discussed with Alan before).

Do you mean?

  39 #ifdef __cplusplus
  40 extern "C" {
  41 #endif

I'll add it back to avoid any confusion.

> Also, I'm thinking if it is a good idea to separate the transport
> versioning to an RFE.
> It would allow to focus on this aspect as necessary.
> In this case, the 8061228 will depend on the versioning.
> However, it is much more simple and can be resolved faster.

It's hard to test versioning code without implementation of
new, VERSION_1_1 transport.

Network part of 8061228 is simple and clear separated from versioning,
so I would prefer to keep it together in one CR/one push.

Restriction turned off by default (I'll file separate CR to enable it
later), so we have enough time to fix any issues that might come.

-Dmitry

> 
> 
> Thanks,
> Serguei
> 
> 
> On 2/28/17 01:41, Dmitry Samersoff wrote:
>> Everybody,
>>
>> Please review:
>>
>> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/
>>
>> These changes introduce new parameter[1] of the socket transport -
>> allow. Users can explicitly specify a list of hosts that allowed to
>> connect to jdwp server and it's the second part of JDWP hardening[2].
>>
>> No restrictions are applied by default now but I'll file a separate CR
>> to restrict list of allowed peers to localhost by default.
>>
>> Also these changes implement versioning for jdwp transport and therefor
>> simplify feature development of jdwp.
>>
>>
>> 1. Example command line:
>>
>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
>> address=*,allow="127.0.0.0/8;192.168.0.0/24"
>>
>> Possible values for allow parameter:
>>*   - accept connections from everywhere.
>>N.N.N.N - accept connections from this IP address only
>>N.N.N.N/nn  - accept connections from particular ip subnet
>>
>>
>>
>> 2. JDK-8052136 JDWP hardening
>>
>> -Dmitry
>>
> 


-- 
Dmitry Samersoff
Oracle Java development team, Saint Petersburg, Russia
* I would love to change the world, but they won't give me the sources.


Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-14 Thread serguei.spit...@oracle.com

Hi Dmitry,

We already had a big review thread back in 2014 on this.
I think, it is again going in the wrong order.

First, I think, it is better to start from a CCC (or its equivalent, CSR).
This will allow to focus on and sort out the changes in interface/behavior
first before going into the implementation details.

Second, I'd suggest to separate a couple of other things.
I still see the C .vs. C++ related change in the jdwpTransport.h.
It is better to leave it along for now as it was suggested in early 
review rounds.

If you still want to fix it then it is better to file a separate bug that
should include the JNI as well (as it was discussed with Alan before).

Also, I'm thinking if it is a good idea to separate the transport 
versioning to an RFE.

It would allow to focus on this aspect as necessary.
In this case, the 8061228 will depend on the versioning.
However, it is much more simple and can be resolved faster.


Thanks,
Serguei


On 2/28/17 01:41, Dmitry Samersoff wrote:

Everybody,

Please review:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/

These changes introduce new parameter[1] of the socket transport -
allow. Users can explicitly specify a list of hosts that allowed to
connect to jdwp server and it's the second part of JDWP hardening[2].

No restrictions are applied by default now but I'll file a separate CR
to restrict list of allowed peers to localhost by default.

Also these changes implement versioning for jdwp transport and therefor
simplify feature development of jdwp.


1. Example command line:

-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
address=*,allow="127.0.0.0/8;192.168.0.0/24"

Possible values for allow parameter:
   *   - accept connections from everywhere.
   N.N.N.N - accept connections from this IP address only
   N.N.N.N/nn  - accept connections from particular ip subnet



2. JDK-8052136 JDWP hardening

-Dmitry





Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-13 Thread Dmitry Samersoff
Robbin,

Please, see:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.11

> 1:
> So connecting with an unallowed client terminates the VM.

Fixed.

> 2:
> Starting with an bad allow filter terminates the VM when connecting a
> client.

Moved allowed parameter (and parser call) to StartListening.

-Dmitry


On 2017-03-10 15:56, Robbin Ehn wrote:
> Hi Dmitry,
> 
> I took a look at this, I have two practical issues:
> 
> 1:
> [rehn@rehn-ws dev]$ java
> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.6.6.6
> -cp runs ForEver
> Listening for transport dt_socket at address: 
> ERROR: transport error 202: peer not allowed to connect: Success
> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
> error [transport.c:358]
> 
> So connecting with an unallowed client terminates the VM.
> 
> 2:
> [rehn@rehn-ws dev]$ java
> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.BAD.6.6
> -cp runs ForEver
> Listening for transport dt_socket at address: 
> ERROR: transport error 202: unable to parse list of allowed peers: Success
> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
> error [transport.c:358]
> 
> Starting with an bad allow filter terminates the VM when connecting a
> client.
> 
> 
> Connecting with an unallowed ip/port should not terminate the VM and we
> should verify allow filter directly at startup.
> 
> Thanks
> 
> /Robbin
> 
> On 02/28/2017 10:41 AM, Dmitry Samersoff wrote:
>> Everybody,
>>
>> Please review:
>>
>> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/
>>
>> These changes introduce new parameter[1] of the socket transport -
>> allow. Users can explicitly specify a list of hosts that allowed to
>> connect to jdwp server and it's the second part of JDWP hardening[2].
>>
>> No restrictions are applied by default now but I'll file a separate CR
>> to restrict list of allowed peers to localhost by default.
>>
>> Also these changes implement versioning for jdwp transport and therefor
>> simplify feature development of jdwp.
>>
>>
>> 1. Example command line:
>>
>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
>> address=*,allow="127.0.0.0/8;192.168.0.0/24"
>>
>> Possible values for allow parameter:
>>   *   - accept connections from everywhere.
>>   N.N.N.N - accept connections from this IP address only
>>   N.N.N.N/nn  - accept connections from particular ip subnet
>>
>>
>>
>> 2. JDK-8052136 JDWP hardening
>>
>> -Dmitry
>>


-- 
Dmitry Samersoff
Oracle Java development team, Saint Petersburg, Russia
* I would love to change the world, but they won't give me the sources.


Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-10 Thread Dmitry Samersoff
Robbin,

Agree, I'll fix it.

-Dmitry

On 2017-03-10 15:56, Robbin Ehn wrote:
> Hi Dmitry,
> 
> I took a look at this, I have two practical issues:
> 
> 1:
> [rehn@rehn-ws dev]$ java
> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.6.6.6
> -cp runs ForEver
> Listening for transport dt_socket at address: 
> ERROR: transport error 202: peer not allowed to connect: Success
> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
> error [transport.c:358]
> 
> So connecting with an unallowed client terminates the VM.
> 
> 2:
> [rehn@rehn-ws dev]$ java
> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.BAD.6.6
> -cp runs ForEver
> Listening for transport dt_socket at address: 
> ERROR: transport error 202: unable to parse list of allowed peers: Success
> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
> error [transport.c:358]
> 
> Starting with an bad allow filter terminates the VM when connecting a
> client.
> 
> 
> Connecting with an unallowed ip/port should not terminate the VM and we
> should verify allow filter directly at startup.
> 
> Thanks
> 
> /Robbin
> 
> On 02/28/2017 10:41 AM, Dmitry Samersoff wrote:
>> Everybody,
>>
>> Please review:
>>
>> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/
>>
>> These changes introduce new parameter[1] of the socket transport -
>> allow. Users can explicitly specify a list of hosts that allowed to
>> connect to jdwp server and it's the second part of JDWP hardening[2].
>>
>> No restrictions are applied by default now but I'll file a separate CR
>> to restrict list of allowed peers to localhost by default.
>>
>> Also these changes implement versioning for jdwp transport and therefor
>> simplify feature development of jdwp.
>>
>>
>> 1. Example command line:
>>
>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
>> address=*,allow="127.0.0.0/8;192.168.0.0/24"
>>
>> Possible values for allow parameter:
>>   *   - accept connections from everywhere.
>>   N.N.N.N - accept connections from this IP address only
>>   N.N.N.N/nn  - accept connections from particular ip subnet
>>
>>
>>
>> 2. JDK-8052136 JDWP hardening
>>
>> -Dmitry
>>


-- 
Dmitry Samersoff
Oracle Java development team, Saint Petersburg, Russia
* I would love to change the world, but they won't give me the sources.


Re: RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only

2017-03-10 Thread Robbin Ehn

Hi Dmitry,

I took a look at this, I have two practical issues:

1:
[rehn@rehn-ws dev]$ java 
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.6.6.6
 -cp runs ForEver
Listening for transport dt_socket at address: 
ERROR: transport error 202: peer not allowed to connect: Success
JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal error 
[transport.c:358]

So connecting with an unallowed client terminates the VM.

2:
[rehn@rehn-ws dev]$ java 
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:,allow=6.BAD.6.6
 -cp runs ForEver
Listening for transport dt_socket at address: 
ERROR: transport error 202: unable to parse list of allowed peers: Success
JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal error 
[transport.c:358]

Starting with an bad allow filter terminates the VM when connecting a client.


Connecting with an unallowed ip/port should not terminate the VM and we should 
verify allow filter directly at startup.

Thanks

/Robbin

On 02/28/2017 10:41 AM, Dmitry Samersoff wrote:

Everybody,

Please review:

http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/

These changes introduce new parameter[1] of the socket transport -
allow. Users can explicitly specify a list of hosts that allowed to
connect to jdwp server and it's the second part of JDWP hardening[2].

No restrictions are applied by default now but I'll file a separate CR
to restrict list of allowed peers to localhost by default.

Also these changes implement versioning for jdwp transport and therefor
simplify feature development of jdwp.


1. Example command line:

-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
address=*,allow="127.0.0.0/8;192.168.0.0/24"

Possible values for allow parameter:
  *   - accept connections from everywhere.
  N.N.N.N - accept connections from this IP address only
  N.N.N.N/nn  - accept connections from particular ip subnet



2. JDK-8052136 JDWP hardening

-Dmitry