On 4/24/19 10:38 AM, Martin Balao wrote:
Hi Sean,

On 4/24/19 7:12 AM, Sean Mullan wrote:

I am still concerned about the odd workaround for this issue. Can you
comment on my previous comment that I raised?:

On 4/23/19 4:33 PM, Sean Mullan wrote:> However, I think there may be a
more subtle bug or configuration issue
underlying this. It seems like this could come up in real scenarios. You
should never disable a strong algorithm, even if it is unsupported, in
order to establish a TLS session. It should be able to negotiate a
session using a different algorithm.


The reason why we disable the algorithm in the test is related to [1].
What happens is that we need to have SunPKCS11, SUN and JSSE crypto
providers enabled for a successful TLS communication in FIPS mode. The
reason we need SUN -which looks as the odd one out there- are X.509
certificates. However, having SUN enabled (after JSSE experimental FIPS
changes) means that we support "RSAPSS" for the TLS communication. When
this algorithm is applied by SUN provider to a SunPKCS11-sensitive key
(keys are sensitive in FIPS mode and cannot be converted), it fails. As
I said in [1], we need a good solution beyond the workaround of
disabling concrete algorithms. I'd be happy to update the test when this
is fixed.

Ok, thanks for that link. We need to file another bug to track the underlying issue then as I don't see anything filed. It seems quite likely that this could come up in a real scenario and telling a customer to disable RSA-PSS is just not right in my opinion.

Can you please file a bug for that and link it to this test bug? I'm ok with you pushing this test workaround fix for now since we need to get this resolved soon. I also agree with Xuelei that it would be helpful to add more comments in the test as to why the security property workaround is needed.

Thanks,
Sean


Kind regards,
Martin.-

--
[1] -
https://mail.openjdk.java.net/pipermail/security-dev/2019-March/019469.html

Reply via email to