Hi, Any updates on this issue
Regards, Jana On Fri, May 9, 2008 at 11:11 PM, Janardhanan Vembunarayanan < [EMAIL PROTECTED]> wrote: > Hi All, > > I have updated the bug https://issues.apache.org/jira/browse/DIRMINA-580 > > After adding the following line it worked. But I am not sure if this is the > right fix But this just to prove that the bug is on the Mina side. > > Please can someone confirm this. > > This is a critical production issue for us. > > //////////////////////////////////////Added this line > decrypt(nextFilter); > //////////////////////////////////////Added this line > > In the SSLHandler.java after adding the following line it worked > > public void handshake(NextFilter nextFilter) throws SSLException { > if (SessionLog.isDebugEnabled(session)) { > SessionLog.debug(session, " doHandshake()"); > } > > for (;;) { > System.out.println(System.currentTimeMillis() + " sslhandler > handshake 503sessionid = " + session.getAttribute("503") + " handshakeStatus > = " + handshakeStatus + " handshakeComplete = " + handshakeComplete); > if (handshakeStatus == > SSLEngineResult.HandshakeStatus.FINISHED) { > session.setAttribute(SSLFilter.SSL_SESSION, sslEngine > .getSession()); > if (SessionLog.isDebugEnabled(session)) { > SSLSession sslSession = sslEngine.getSession(); > SessionLog.debug(session, > " handshakeStatus=FINISHED"); > SessionLog.debug(session, " sslSession CipherSuite used > " > + sslSession.getCipherSuite()); > } > handshakeComplete = true; > if (!initialHandshakeComplete > && > session.containsAttribute(SSLFilter.USE_NOTIFICATION)) { > // SESSION_SECURED is fired only when it's the first > handshake. > // (i.e. renegotiation shouldn't trigger > SESSION_SECURED.) > initialHandshakeComplete = true; > scheduleMessageReceived(nextFilter, > SSLFilter.SESSION_SECURED); > } > //////////////////////////////////////Added this line > decrypt(nextFilter); > //////////////////////////////////////Added this line > break; > } > ... > } > > > Regards, > Jana > > > On Fri, May 9, 2008 at 9:49 PM, Janardhanan Vembunarayanan < > [EMAIL PROTECTED]> wrote: > >> Hi All, >> >> I have given below the step by step analysis of why the data is not sent >> down the filter/handler SSLFilter/SSLHandler. >> I have updated the bug on this issue >> >> https://issues.apache.org/jira/browse/DIRMINA-580 >> >> 503sessionid = 82 Data Read: >> [EMAIL PROTECTED] (HeapBuffer[pos=0 >> lim=512 cap=512: 16 03 01 00 20 86 E4 DA BC C8 EA 3F 29 D8 2E 29 46 16 02 1F >> F0 47 93 0A 90 BB 95 B2 12 87 06 EA 6C 2E 6E 31 CD 17 03 01 04 88 0D 19 20 >> 07 F4 1A E0 E2 19 4C 5B E6 A8 D4 B9 71 07 75 1E 3F 20 DF F9 E7 8E EE 2D 17 >> 8C FA CE 8E 55 CC 4C DC DA D8 22 8B 15 D3 DD D6 12 25 5B 11 C2 E1 38 B6 D3 >> 7A 91 DD 0A 25 91 08 E9 63 FF 57 54 12 47 53 DE 30 6D 2F 66 95 D6 2D 29 17 >> 8B 40 C7 E9 C7 7A E8 79 25 AB D2 B4 0D CB 03 3E 7E 6B 62 A7 49 FC F5 7A DB >> F0 B4 8F 40 D3 20 DD 75 55 11 2C 6C 67 89 10 8E F4 F9 21 F7 72 E4 43 B6 77 >> 9C FA 64 17 D4 84 9C 49 56 3C A5 BA 0A B9 E4 CA CA F8 3D 04 64 BA D2 50 18 >> 00 95 59 3D F2 45 09 C3 21 B6 14 C0 7A CC E8 CD 7A 73 F9 B3 72 B5 6D A5 90 >> F0 21 31 AB A3 47 CD 3E DA D9 76 DF 97 7F FA B9 DC F3 AA 8D A4 92 2D 7D DB >> 27 BB 51 1D D2 FF 42 0F 32 AD 3B BE F2 11 03 05 4C AB 6B FC 1E 4D 99 9D 5D >> 90 A5 5C FD 03 39 D8 8D 58 74 16 16 49 7D 96 F5 7E 28 43 9D 80 74 18 B2 2D >> B1 C8 E8 1B 8E 81 05 43 D1 89 6F B1 64 08 8D EC 73 F6 B2 64 48 F7 7C DC 7A >> 10 F4 AF EB D0 14 35 5E DB 24 9F DC 27 4F E1 D8 CB 22 15 14 3A 81 C4 D8 8F >> 44 C7 3D DC 9D B1 AE B5 FF 97 6B 9A A0 2C 6D AE 93 22 22 DB F3 8C FF 6B 06 >> 27 FB C8 65 FB C7 7F E0 D4 06 CD 04 D1 60 F8 12 EE C9 21 63 BB 39 BD A7 84 >> F6 34 C5 67 B2 43 32 1E E2 B3 99 EB C0 48 D4 77 D5 64 DF A9 41 4D 4A E4 FD >> 45 E9 E0 AB B1 4B F6 8E 71 CF B7 C0 3C 5F 1A C8 65 5E 3D BA 52 27 4A B2 05 >> CF 38 30 81 3E 84 BE 4D 47 C5 72 29 1C 14 85 1F 2B 85 59 EA D8 DB 99 7E 5D >> 2B 93 49 27 61 F6 55 EF 31 96 A8 C3 6D 2E 57 AC 62 76 6A D9 5B 1D 8C FD 0D >> 27 A8 8A BE 09 6F EA EA AC 59 86 05 9D 24 6F 56 C3])null >> >> At this stage the information is copied >> >> 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=512 >> cap=16665]null >> 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330 >> cap=33330]null >> >> and the status moves to FINISHED and OK >> >> 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus = >> FINISHED status = OK >> >> At this stage it is in the method unwrapHandshake it gets into the method >> which calls unwrap0 again and the status >> moves to NOT_HANDSHAKING and BUFFER_UNDERFLOW. After this the inNetBuffer >> is compacted and this will cause the >> method handshake() to break from the for(;;) loop >> >> At this stage the buffer look like this >> >> 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=37 lim=512 >> cap=16665]null >> 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330 >> cap=33330]null >> >> 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus = >> NOT_HANDSHAKING status = BUFFER_UNDERFLOW >> >> // If handshake finished, no data was produced, and the status is >> still ok, >> // try to unwrap more >> if (handshakeStatus == SSLEngineResult.HandshakeStatus.FINISHED >> && res.getStatus() == SSLEngineResult.Status.OK >> && inNetBuffer.hasRemaining()) { >> res = unwrap0(); >> >> // prepare to be written again >> inNetBuffer.compact(); >> >> renegotiateIfNeeded(nextFilter, res); >> } >> >> After this the client sends its next set of messages as given below. >> >> 503sessionid = 82 Data Read: >> [EMAIL PROTECTED] (HeapBuffer[pos=0 >> lim=690 cap=1024: 35 CD B0 6A 74 E6 00 08 31 CA D5 F5 97 3C F3 87 2F A9 6A >> 05 1C 75 48 14 A8 51 D9 54 D7 6F B8 22 89 0E 14 96 89 6F E9 35 F4 93 0B A7 >> F3 26 8B 66 F5 72 99 1A 37 6E B6 19 DA CE 88 5B 78 79 E3 E4 93 6B 35 F2 68 >> D5 43 2D 8C D6 30 85 25 87 C0 C1 F3 5E 1D AB EF 42 6F 92 90 D3 B7 C3 3A 24 >> 1E 80 63 5A B7 A9 00 25 79 59 92 8F 36 0E DE AF 9C 15 8E 40 6C BA AF 4A 22 >> 0D 63 67 FB 24 2C 0F 70 95 7F 68 1D C1 98 4A 2C 81 FA 7C 6A 73 95 1D E8 C2 >> D2 FD 10 0F 8E 43 8F AE F8 E2 59 49 16 45 CE B2 38 1E 77 C8 FE 1D 49 78 0A >> A2 D6 60 44 2C 4F 8F 80 67 CC 6A 3E FA 10 A8 3D DF F0 AD 1A E7 00 69 D8 F3 >> 14 71 BD 4D 99 95 3C AC CE BF 7B 66 3B 4E 59 E2 68 48 E8 ED 48 9C 33 3B 41 >> 3C 9A F5 C3 47 6C 8E E3 20 94 F3 86 F2 9F 36 82 D8 2F D0 71 07 0B AC 69 31 >> 57 EC 06 D3 A7 62 7B 49 60 A9 2E 3A 49 CB 28 90 A0 CD 7A A4 7C 37 B6 6B C5 >> 6E 20 C6 5E 97 39 47 F1 B8 6A AF DD 03 04 DC 21 B7 BB A7 7D BF 09 B6 FA 43 >> 32 F9 FF ED 49 7C 15 99 83 4A BD 3A EC E3 03 FC 0B 83 08 01 E9 4F 8C 86 C7 >> 37 E2 81 D7 D5 00 2F A4 34 DB 3C 6B 5D 65 7C 53 AF 22 1B FB CE 3A C4 76 D8 >> 14 C9 4A C6 35 90 0B 0D D2 F1 10 A5 E7 1A 8C 8E FA B1 93 47 E6 67 AF 6F 10 >> 7A 77 05 78 9A C5 43 C8 0E 81 78 57 A5 31 44 09 1C A7 48 17 DD 2B B4 B2 29 >> 1D B9 2B 0C DD 23 84 1F F7 44 1C A1 CE 64 D5 B1 78 EB 2A 04 20 4D 26 63 6B >> 22 58 4D 1F 3C 1D 95 CF C8 B2 04 29 23 6E DD 06 BD 7D BD A1 94 62 55 86 4E >> 32 F4 82 89 7F C5 C6 87 0A 8E E6 CB DA F4 5D AA 25 DB 2D 56 14 62 C9 79 86 >> B8 64 F9 26 62 D8 A7 24 4D 0D 82 27 08 FA 75 D7 80 D0 E7 27 CA E7 AE 3C 8B >> 9E F9 92 A3 80 58 A7 5E CE 52 19 18 77 F5 09 44 B8 9C 59 DD 29 FB 45 9B 7D >> B4 36 86 52 53 C0 23 3A 83 B6 F6 B9 73 D2 08 56 EA A5 84 3F A7 34 21 A6 96 >> 88 E3 41 9B D7 8F 84 6B F6 97 DD 99 F7 20 36 FA BD 8E 93 A2 A4 B8 8A 98 74 >> 5C D5 BA 26 E3 8F 8C EB 00 53 F2 A3 78 87 9E FF C4 62 36 99 7A F8 10 EF F8 >> 2F 74 F4 66 5B BE 9E 7F 3A 14 59 9D 91 A6 7E 8A F3 55 7A A7 60 A6 BD 24 02 >> D3 59 FA 7D B5 6A 8C A9 56 71 CD 0B C3 20 26 0E F2 9A 66 56 92 4F F6 0F 04 >> D6 72 64 3C 83 AB 5C D0 2A 5B 90 CA BF 2F 37 62 7F 1E 97 16 10 AA 3E D9 36 >> B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29 70 36 67 E3 B3 B2])null >> >> >> So we already have 476 bytes and then we are getting 690 bytes. >> >> Now in the handshake() method we have >> >> 1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus = >> FINISHED handshakeComplete = false >> >> This gets into the block and the state is >> >> 1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus = >> FINISHED handshakeComplete = true >> >> for(;;;) >> if (handshakeStatus == >> SSLEngineResult.HandshakeStatus.FINISHED) { >> session.setAttribute(SSLFilter.SSL_SESSION, >> sslEngine.getSession()); >> handshakeComplete = true; >> ... >> break; >> } >> ... >> >> But at this point we have all the data but we are not doing anything with >> the data and sitting there until the idle timeout >> gets triggered and this is the issue in this case >> >> Thus in the method messageReceived of SSLHandler the decrypt method never >> gets called as the client is done with sending >> the data and we have the data in the inNetBuffer and it never gets copied >> to the appBuffer >> >> if (!handshakeComplete) { >> handshake(nextFilter); >> } else { >> decrypt(nextFilter); >> } >> >> Regards, >> Jana >> >> >> On Fri, May 9, 2008 at 5:33 PM, Janardhanan Vembunarayanan < >> [EMAIL PROTECTED]> wrote: >> >>> Hi, >>> >>> I have updated the bug >>> https://issues.apache.org/jira/browse/DIRMINA-580with the stack trace for >>> that session. >>> >>> The client is sending the data but the SSL State on the Mina Server is >>> not correct. >>> >>> The snippet from the attachment is given below. >>> >>> 503sessionid = 82 Data Read: >>> [EMAIL PROTECTED] (HeapBuffer[pos=0 >>> lim=110 cap=1024: 16 03 01 00 69 01 00 00 65 03 01 48 24 8C >>> >>> 98 14 3A D2 D3 50 A0 99 B7 EF 00 73 3F 96 FE 73 4B 50 90 3E 2D 58 D7 F4 >>> 4D FB F0 45 46 20 48 24 8C 98 76 22 71 CA C5 6C 41 CA 67 1E 43 CF 24 1D 40 >>> F8 C5 C7 >>> >>> FE 99 C5 3B F1 01 7E 1A B5 A5 00 1E 00 04 00 05 00 2F 00 33 00 32 00 0A >>> 00 16 00 13 00 09 00 15 00 12 00 03 00 08 00 14 00 11 01 00])null >>> >>> 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=110 >>> cap=16665]null >>> 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330 >>> cap=33330]null >>> >>> 503sessionid = 82 write outNetBuffer: java.nio.DirectByteBuffer[pos=0 >>> lim=79 cap=16665]null >>> 503sessionid = 82 session write: HeapBuffer[pos=0 lim=79 cap=79: 16 03 01 >>> 00 4A 02 00 00 46 03 01 48 24 8C 98 C6 2F B8 7B 3C 62 72 16 8E 46 11 61 3F >>> DA A3 B0 >>> >>> 5D 83 10 03 25 59 7A 77 1A D2 7C 09 20 48 24 8C 98 76 22 71 CA C5 6C 41 >>> CA 67 1E 43 CF 24 1D 40 F8 C5 C7 FE 99 C5 3B F1 01 7E 1A B5 A5 00 04 00]null >>> >>> 503sessionid = 82 Wrap res:Status = OK HandshakeStatus = NEED_UNWRAP >>> 503sessionid = 82 write outNetBuffer: java.nio.DirectByteBuffer[pos=0 >>> lim=37 cap=16665]null >>> 503sessionid = 82 session write: HeapBuffer[pos=0 lim=37 cap=37: 16 03 01 >>> 00 20 FD 69 12 21 D6 10 D7 C8 23 65 37 A5 08 5D DF E6 0C DF 17 14 5D 51 5B >>> A9 07 A1 >>> >>> 7C B7 22 50 2C E0]null >>> >>> 503sessionid = 82 Data Read: >>> [EMAIL PROTECTED] (HeapBuffer[pos=0 >>> lim=6 cap=1024: 14 03 01 00 01 01])null >>> 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=6 >>> cap=16665]null >>> 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330 >>> cap=33330]null >>> >>> >>> 503sessionid = 82 Data Read: >>> [EMAIL PROTECTED] (HeapBuffer[pos=0 >>> lim=512 cap=512: 16 03 01 00 20 86 E4 DA BC C8 EA 3F 29 D8 >>> >>> 2E 29 46 16 02 1F F0 47 93 0A 90 BB 95 B2 12 87 06 EA 6C 2E 6E 31 CD 17 >>> 03 01 04 88 0D 19 20 07 F4 1A E0 E2 19 4C 5B E6 A8 D4 B9 71 07 75 1E 3F 20 >>> DF F9 E7 >>> >>> 8E EE 2D 17 8C FA CE 8E 55 CC 4C DC DA D8 22 8B 15 D3 DD D6 12 25 5B 11 >>> C2 E1 38 B6 D3 7A 91 DD 0A 25 91 08 E9 63 FF 57 54 12 47 53 DE 30 6D 2F 66 >>> 95 D6 2D >>> >>> 29 17 8B 40 C7 E9 C7 7A E8 79 25 AB D2 B4 0D CB 03 3E 7E 6B 62 A7 49 FC >>> F5 7A DB F0 B4 8F 40 D3 20 DD 75 55 11 2C 6C 67 89 10 8E F4 F9 21 F7 72 E4 >>> 43 B6 77 >>> >>> 9C FA 64 17 D4 84 9C 49 56 3C A5 BA 0A B9 E4 CA CA F8 3D 04 64 BA D2 50 >>> 18 00 95 59 3D F2 45 09 C3 21 B6 14 C0 7A CC E8 CD 7A 73 F9 B3 72 B5 6D A5 >>> 90 F0 21 >>> >>> 31 AB A3 47 CD 3E DA D9 76 DF 97 7F FA B9 DC F3 AA 8D A4 92 2D 7D DB 27 >>> BB 51 1D D2 FF 42 0F 32 AD 3B BE F2 11 03 05 4C AB 6B FC 1E 4D 99 9D 5D 90 >>> A5 5C FD >>> >>> 03 39 D8 8D 58 74 16 16 49 7D 96 F5 7E 28 43 9D 80 74 18 B2 2D B1 C8 E8 >>> 1B 8E 81 05 43 D1 89 6F B1 64 08 8D EC 73 F6 B2 64 48 F7 7C DC 7A 10 F4 AF >>> EB D0 14 >>> >>> 35 5E DB 24 9F DC 27 4F E1 D8 CB 22 15 14 3A 81 C4 D8 8F 44 C7 3D DC 9D >>> B1 AE B5 FF 97 6B 9A A0 2C 6D AE 93 22 22 DB F3 8C FF 6B 06 27 FB C8 65 FB >>> C7 7F E0 >>> >>> D4 06 CD 04 D1 60 F8 12 EE C9 21 63 BB 39 BD A7 84 F6 34 C5 67 B2 43 32 >>> 1E E2 B3 99 EB C0 48 D4 77 D5 64 DF A9 41 4D 4A E4 FD 45 E9 E0 AB B1 4B F6 >>> 8E 71 CF >>> >>> B7 C0 3C 5F 1A C8 65 5E 3D BA 52 27 4A B2 05 CF 38 30 81 3E 84 BE 4D 47 >>> C5 72 29 1C 14 85 1F 2B 85 59 EA D8 DB 99 7E 5D 2B 93 49 27 61 F6 55 EF 31 >>> 96 A8 C3 >>> >>> 6D 2E 57 AC 62 76 6A D9 5B 1D 8C FD 0D 27 A8 8A BE 09 6F EA EA AC 59 86 >>> 05 9D 24 6F 56 C3])null >>> >>> >>> 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=512 >>> cap=16665]null >>> 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330 >>> cap=33330]null >>> >>> 503sessionid = 82 Unwrap res:Status = OK HandshakeStatus = FINISHED >>> 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=37 lim=512 >>> cap=16665]null >>> 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330 >>> cap=33330]null >>> 1210354840435 sslhandler unwrap0 503sessionid = 82 >>> 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus = >>> NOT_HANDSHAKING status = BUFFER_UNDERFLOW >>> 503sessionid = 82 Unwrap res:Status = BUFFER_UNDERFLOW HandshakeStatus = >>> NOT_HANDSHAKING >>> 1210354840435 sslfilter mr 503sessionid = 82 >>> >>> 503sessionid = 82 Data Read: >>> [EMAIL PROTECTED] (HeapBuffer[pos=0 >>> lim=690 cap=1024: 35 CD B0 6A 74 E6 00 08 31 CA D5 F5 97 3C >>> >>> F3 87 2F A9 6A 05 1C 75 48 14 A8 51 D9 54 D7 6F B8 22 89 0E 14 96 89 6F >>> E9 35 F4 93 0B A7 F3 26 8B 66 F5 72 99 1A 37 6E B6 19 DA CE 88 5B 78 79 E3 >>> E4 93 6B >>> >>> 35 F2 68 D5 43 2D 8C D6 30 85 25 87 C0 C1 F3 5E 1D AB EF 42 6F 92 90 D3 >>> B7 C3 3A 24 1E 80 63 5A B7 A9 00 25 79 59 92 8F 36 0E DE AF 9C 15 8E 40 6C >>> BA AF 4A >>> >>> 22 0D 63 67 FB 24 2C 0F 70 95 7F 68 1D C1 98 4A 2C 81 FA 7C 6A 73 95 1D >>> E8 C2 D2 FD 10 0F 8E 43 8F AE F8 E2 59 49 16 45 CE B2 38 1E 77 C8 FE 1D 49 >>> 78 0A A2 >>> >>> D6 60 44 2C 4F 8F 80 67 CC 6A 3E FA 10 A8 3D DF F0 AD 1A E7 00 69 D8 F3 >>> 14 71 BD 4D 99 95 3C AC CE BF 7B 66 3B 4E 59 E2 68 48 E8 ED 48 9C 33 3B 41 >>> 3C 9A F5 >>> >>> C3 47 6C 8E E3 20 94 F3 86 F2 9F 36 82 D8 2F D0 71 07 0B AC 69 31 57 EC >>> 06 D3 A7 62 7B 49 60 A9 2E 3A 49 CB 28 90 A0 CD 7A A4 7C 37 B6 6B C5 6E 20 >>> C6 5E 97 >>> >>> 39 47 F1 B8 6A AF DD 03 04 DC 21 B7 BB A7 7D BF 09 B6 FA 43 32 F9 FF ED >>> 49 7C 15 99 83 4A BD 3A EC E3 03 FC 0B 83 08 01 E9 4F 8C 86 C7 37 E2 81 D7 >>> D5 00 2F >>> >>> A4 34 DB 3C 6B 5D 65 7C 53 AF 22 1B FB CE 3A C4 76 D8 14 C9 4A C6 35 90 >>> 0B 0D D2 F1 10 A5 E7 1A 8C 8E FA B1 93 47 E6 67 AF 6F 10 7A 77 05 78 9A C5 >>> 43 C8 0E >>> >>> 81 78 57 A5 31 44 09 1C A7 48 17 DD 2B B4 B2 29 1D B9 2B 0C DD 23 84 1F >>> F7 44 1C A1 CE 64 D5 B1 78 EB 2A 04 20 4D 26 63 6B 22 58 4D 1F 3C 1D 95 CF >>> C8 B2 04 >>> >>> 29 23 6E DD 06 BD 7D BD A1 94 62 55 86 4E 32 F4 82 89 7F C5 C6 87 0A 8E >>> E6 CB DA F4 5D AA 25 DB 2D 56 14 62 C9 79 86 B8 64 F9 26 62 D8 A7 24 4D 0D >>> 82 27 08 >>> >>> FA 75 D7 80 D0 E7 27 CA E7 AE 3C 8B 9E F9 92 A3 80 58 A7 5E CE 52 19 18 >>> 77 F5 09 44 B8 9C 59 DD 29 FB 45 9B 7D B4 36 86 52 53 C0 23 3A 83 B6 F6 B9 >>> 73 D2 08 >>> >>> 56 EA A5 84 3F A7 34 21 A6 96 88 E3 41 9B D7 8F 84 6B F6 97 DD 99 F7 20 >>> 36 FA BD 8E 93 A2 A4 B8 8A 98 74 5C D5 BA 26 E3 8F 8C EB 00 53 F2 A3 78 87 >>> 9E FF C4 >>> >>> 62 36 99 7A F8 10 EF F8 2F 74 F4 66 5B BE 9E 7F 3A 14 59 9D 91 A6 7E 8A >>> F3 55 7A A7 60 A6 BD 24 02 D3 59 FA 7D B5 6A 8C A9 56 71 CD 0B C3 20 26 0E >>> F2 9A 66 >>> >>> 56 92 4F F6 0F 04 D6 72 64 3C 83 AB 5C D0 2A 5B 90 CA BF 2F 37 62 7F 1E >>> 97 16 10 AA 3E D9 36 B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29 70 36 67 >>> E3 B3 >>> >>> B2])null >>> >>> This is not read back into the iNetBuffer even though the client is >>> sending the data to the server >>> >>> Jana >>> >>> >>> On Fri, May 9, 2008 at 5:00 PM, Kyle Sampson <[EMAIL PROTECTED]> >>> wrote: >>> >>>> Janardhanan, >>>> >>>> It's certainly possible that this same problem is on the 1.0.x branch as >>>> well, though I haven't tested it. The JIRA bug indicates that it affected >>>> 1.0.3 and was fixed in 1.0.4, but like the 1.1.x branch it may have snuck >>>> back in (assuming again that this is in fact the problem). >>>> >>>> I found this post with the same issue from June 2007: >>>> http://markmail.org/message/i4p374325cwnno66. I tried using the JAR >>>> file provided by Trustin, and it worked. Not sure if this related to that >>>> JIRA bug. >>>> >>>> >>>> On May 9, 2008, at 4:00 PM, Janardhanan Vembunarayanan wrote: >>>> >>>> Hi Kyle, >>>>> >>>>> I am seeing SSL issues on 1.0.9 is this is an issue in this branch as >>>>> well? >>>>> The issue is connection gets established and after which the data is >>>>> not >>>>> read. >>>>> I have given the handshake information below. >>>>> >>>>> 1210272744747 sslfilter mr 503sessionid = 25 >>>>> 1210272744747 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_UNWRAP handshakeComplete = false >>>>> 1210272744747 sslhandler unwrapHandshake 503sessionid = 25 >>>>> 1210272744747 sslhandler unwrap0 503sessionid = 25 >>>>> 1210272744747 sslhandler unwrap0 503sessionid = 25 handshakestatus = >>>>> NEED_TASK status = OK >>>>> 1210272744747 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_TASK handshakeComplete = false >>>>> 1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_WRAP handshakeComplete = false >>>>> 1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_WRAP handshakeComplete = false >>>>> 1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_WRAP handshakeComplete = false >>>>> 1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_UNWRAP handshakeComplete = false >>>>> 1210272744749 sslhandler unwrapHandshake 503sessionid = 25 >>>>> 1210272744749 sslhandler unwrap0 503sessionid = 25 >>>>> 1210272744749 sslhandler unwrap0 503sessionid = 25 handshakestatus = >>>>> NEED_UNWRAP status = BUFFER_UNDERFLOW >>>>> 1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_UNWRAP handshakeComplete = false >>>>> 1210272744749 sslhandler unwrapHandshake 503sessionid = 25 >>>>> 1210272744749 sslhandler unwrap0 503sessionid = 25 >>>>> 1210272744749 sslhandler unwrap0 503sessionid = 25 handshakestatus = >>>>> NEED_UNWRAP status = BUFFER_UNDERFLOW >>>>> 1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_UNWRAP handshakeComplete = false >>>>> 1210272744749 sslhandler unwrapHandshake 503sessionid = 25 >>>>> 1210272744749 sslhandler unwrap0 503sessionid = 25 >>>>> 1210272744749 sslhandler unwrap0 503sessionid = 25 handshakestatus = >>>>> NEED_UNWRAP status = BUFFER_UNDERFLOW >>>>> >>>>> 1210272744751 sslfilter mr 503sessionid = 25 >>>>> 1210272744751 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> NEED_UNWRAP handshakeComplete = false >>>>> 1210272744751 sslhandler unwrapHandshake 503sessionid = 25 >>>>> 1210272744752 sslhandler unwrap0 503sessionid = 25 >>>>> 1210272744752 sslhandler unwrap0 503sessionid = 25 handshakestatus = >>>>> NEED_UNWRAP status = OK >>>>> 1210272744752 sslhandler unwrap0 503sessionid = 25 >>>>> 1210272744752 sslhandler unwrap0 503sessionid = 25 handshakestatus = >>>>> FINISHED status = OK >>>>> 1210272744752 sslhandler unwrap0 503sessionid = 25 >>>>> 1210272744752 sslhandler unwrap0 503sessionid = 25 handshakestatus = >>>>> NOT_HANDSHAKING status = BUFFER_UNDERFLOW >>>>> >>>>> 1210272744752 sslfilter mr 503sessionid = 25 >>>>> 1210272744752 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> FINISHED handshakeComplete = false >>>>> 1210272744752 sslhandler handshake 503sessionid = 25 handshakeStatus = >>>>> FINISHED handshakeComplete = true >>>>> >>>>> >>>>> Regards, >>>>> Jana >>>>> >>>>> On Fri, May 9, 2008 at 2:02 PM, Kyle Sampson <[EMAIL PROTECTED]> >>>>> wrote: >>>>> >>>>> It does seem to happen in 1.1.7 as well. >>>>>> >>>>>> >>>>>> On May 9, 2008, at 1:50 PM, Emmanuel Lecharny wrote: >>>>>> >>>>>> Hi, Kyle, >>>>>> >>>>>>> >>>>>>> can you check with the latest releae, 1.1.7 ? >>>>>>> >>>>>>> Thanks ! >>>>>>> >>>>>>> Kyle Sampson wrote: >>>>>>> >>>>>>> I'm using MINA 1.1.3. I added SSLFilter to both the client and >>>>>>>> server >>>>>>>> in my application, and it seems to hang at some point while >>>>>>>> negotiating an >>>>>>>> SSL connection. I found a relevant JIRA issue: >>>>>>>> https://issues.apache.org/jira/browse/DIRMINA-390. This seems to >>>>>>>> have >>>>>>>> been fixed in version 1.1.1. I tried using the >>>>>>>> mina-filter-ssl-1.1.1.jar in place of the 1.1.3 version, and it >>>>>>>> works >>>>>>>> perfectly. So it seems like whatever change was made to fix this >>>>>>>> bug was >>>>>>>> reverted in a later version. >>>>>>>> >>>>>>>> Has anyone else had similar problems? This seems to happen only >>>>>>>> when you >>>>>>>> use SSLFilter along with ProtocolCodecFilter. This may affect only >>>>>>>> the >>>>>>>> 1.1.x branch, I'm not sure. >>>>>>>> >>>>>>>> Kyle Sampson >>>>>>>> [EMAIL PROTECTED] >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> -- >>>>>>> -- >>>>>>> cordialement, regards, >>>>>>> Emmanuel Lécharny >>>>>>> www.iktek.com >>>>>>> directory.apache.org >>>>>>> >>>>>>> >>>>>>> >>>>>>> Kyle Sampson >>>>>> [EMAIL PROTECTED] >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>> >>>>> -- >>>>> www.vshareride.com >>>>> www.pragmaticinvesting.com >>>>> www.younag.com >>>>> >>>> >>>> Kyle Sampson >>>> [EMAIL PROTECTED] >>>> >>>> >>>> >>>> >>> >>> >>> -- >>> www.vshareride.com >>> www.pragmaticinvesting.com >>> www.younag.com >>> >> >> >> >> -- >> www.vshareride.com >> www.pragmaticinvesting.com >> www.younag.com >> > > > > -- > www.vshareride.com > www.pragmaticinvesting.com > www.younag.com > -- www.vshareride.com www.pragmaticinvesting.com www.younag.com
