On 3/12/19 1:12 PM, Xuelei Fan wrote:
On 3/12/2019 6:05 AM, Sean Mullan wrote:
Looks good, but a couple of comments:

In the Solution section, it says: "Applications can change the behavior with the existing SSLParameters.setUseCipherSuitesOrder​() method."

I think you should be more clear that this means applications can change the order of the server's preferred cipher suites. There will be no way to go back to the previous behavior where the client's order is respected.

If a server call SSLParameters.setUseCipherSuitesOrder​(false),  the client's order is respected.

Oh, ok, I retract my comment then. When I read this, I had misinterpreted this to be the method that you use to set the enabled suites.

--Sean


Same comment in the proposed Release Note, although I don't think this section needs to be in the CSR, does it?

It's not a required part of the CSR.  I use this section to have the release note reviewed as well.  I will remove this section as it is a kind of duplication of the release-note entry.

Thanks,
Xuelei

--Sean

On 2/25/19 12:36 PM, Xuelei Fan wrote:
Hi,

Could I have the following CSR reviewed?
    https://bugs.openjdk.java.net/browse/JDK-8219657

It is proposing to use server cipher suite preference by default for TLS connections in JDK. In the current implementation, the server honors the client cipher suite preference by default. It is easier to maintain if using the server cipher suite preference, and then the server can have more control over the security parameters of TLS connections.

I think the compatibility impact should be minimal.  If there is a known risk for you, please let me know by the end of March 4, 2019.

Thanks,
Xuelei

Reply via email to