On Tue, 15 Nov 2022 18:37:50 GMT, Sean Mullan <mul...@openjdk.org> wrote:

> > As you are already there, it may be nice to cover more options that the 
> > protocol may not be used for the handshaking. Here are some cases I'm aware 
> > of:
> > 
> > 1. the protocol is disabled with Security property
> > 2. the protocol is not set while setting the SSLParameters
> > 3. the protocol is not set while set the enabled protocol
> > 4. the protocol is not supported by the peer
> > 5. the protocol is not supported by any cipher suites enabled.
> 
> Good point, but I feel that should be handled in a separate issue, if 
> necessary. Also, most of those other cases above (except for #4) are 
> influenced by additional methods subsequently invoked by the application. 

I think it twice.  It may be not necessary to invoke additional methods 
subsequently by the application.  The impact could be configurations (security 
properties, key store, etc) other than `jdk.tls.disabledAlgorithms`.

> For this one, it may be a bit surprising for the SSLContext to be returned 
> when the protocol is disabled (although it is still compliant with the API as 
> specified), and then later it doesn't work, so the implementation note is 
> useful. 

If the purpose is to make sure an SSLContext instance work later, more options 
may be considered.  IMO, I did not see the value if we cannot make the 
description in a general  and accuracy way.  The "jdk.tls.disabledAlgorithms" 
is just one of many impacts.   All jdk.xxx.disabledAlgorithms properties could 
play a role to break the connection.  It may be not enough to check the  
"jdk.tls.disabledAlgorithms" and than can make sure an SSLContext instance will 
work for sure.

-------------

PR: https://git.openjdk.org/jdk/pull/11172

Reply via email to