I tried the fix you described, and it solved the problem in 1.1.3.

I've been able to temporarily work around the problem by downgrading to 1.1.1, though this is less than ideal.

On May 10, 2008, at 8:30 PM, Janardhanan Vembunarayanan wrote:

Hi,

Any updates on this issue

Regards,
Jana

On Fri, May 9, 2008 at 11:11 PM, Janardhanan Vembunarayanan <
[EMAIL PROTECTED]> wrote:

Hi All,

I have updated the bug https://issues.apache.org/jira/browse/DIRMINA-580

After adding the following line it worked. But I am not sure if this is the
right fix But this just to prove that the bug is on the Mina side.

Please can someone confirm this.

This is a critical production issue for us.

//////////////////////////////////////Added this line
decrypt(nextFilter);
//////////////////////////////////////Added this line

In the SSLHandler.java after adding the following line it worked

   public void handshake(NextFilter nextFilter) throws SSLException {
       if (SessionLog.isDebugEnabled(session)) {
           SessionLog.debug(session, " doHandshake()");
       }

       for (;;) {
        System.out.println(System.currentTimeMillis() + " sslhandler
handshake 503sessionid = " + session.getAttribute("503") + " handshakeStatus
= " + handshakeStatus + " handshakeComplete = " + handshakeComplete);
           if (handshakeStatus ==
SSLEngineResult.HandshakeStatus.FINISHED) {
               session.setAttribute(SSLFilter.SSL_SESSION, sslEngine
                       .getSession());
               if (SessionLog.isDebugEnabled(session)) {
                   SSLSession sslSession = sslEngine.getSession();
                   SessionLog.debug(session,
                           " handshakeStatus=FINISHED");
SessionLog.debug(session, " sslSession CipherSuite used
"
                           + sslSession.getCipherSuite());
               }
               handshakeComplete = true;
               if (!initialHandshakeComplete
                       &&
session.containsAttribute(SSLFilter.USE_NOTIFICATION)) {
// SESSION_SECURED is fired only when it's the first
handshake.
                   // (i.e. renegotiation shouldn't trigger
SESSION_SECURED.)
                   initialHandshakeComplete = true;
                   scheduleMessageReceived(nextFilter,
                           SSLFilter.SESSION_SECURED);
               }
//////////////////////////////////////Added this line
               decrypt(nextFilter);
//////////////////////////////////////Added this line
               break;
           }
...
}


Regards,
Jana


On Fri, May 9, 2008 at 9:49 PM, Janardhanan Vembunarayanan <
[EMAIL PROTECTED]> wrote:

Hi All,

I have given below the step by step analysis of why the data is not sent
down the filter/handler SSLFilter/SSLHandler.
I have updated the bug on this issue

https://issues.apache.org/jira/browse/DIRMINA-580

503sessionid = 82 Data Read:
[EMAIL PROTECTED] (HeapBuffer[pos=0
lim=512 cap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
27 A8 8A BE 09 6F EA EA AC 59 86 05 9D 24 6F 56 C3])null

At this stage the information is copied

503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=512
cap=16665]null
503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330
cap=33330]null

and the status moves to FINISHED and OK

1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus =
FINISHED status = OK

At this stage it is in the method unwrapHandshake it gets into the method
which calls unwrap0 again and the status
moves to NOT_HANDSHAKING and BUFFER_UNDERFLOW. After this the inNetBuffer
is compacted and this will cause the
method handshake() to break from the for(;;) loop

At this stage the buffer look like this

503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=37 lim=512
cap=16665]null
503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330
cap=33330]null

1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus =
NOT_HANDSHAKING status = BUFFER_UNDERFLOW

// If handshake finished, no data was produced, and the status is
still ok,
       // try to unwrap more
if (handshakeStatus == SSLEngineResult.HandshakeStatus.FINISHED
               && res.getStatus() == SSLEngineResult.Status.OK
               && inNetBuffer.hasRemaining()) {
           res = unwrap0();

           // prepare to be written again
           inNetBuffer.compact();

           renegotiateIfNeeded(nextFilter, res);
       }

After this the client sends its next set of messages as given below.

503sessionid = 82 Data Read:
[EMAIL PROTECTED] (HeapBuffer[pos=0
lim=690 cap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
B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29 70 36 67 E3 B3 B2])null


So we already have 476 bytes and then we are getting 690 bytes.

Now in the handshake() method we have

1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus =
FINISHED handshakeComplete = false

This gets into the block and the state is

1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus =
FINISHED handshakeComplete = true

   for(;;;)
            if (handshakeStatus ==
SSLEngineResult.HandshakeStatus.FINISHED) {
               session.setAttribute(SSLFilter.SSL_SESSION,
sslEngine.getSession());
               handshakeComplete = true;
       ...
               break;
           }
           ...

But at this point we have all the data but we are not doing anything with
the data and sitting there until the idle timeout
gets triggered and this is the issue in this case

Thus in the method messageReceived of SSLHandler the decrypt method never
gets called as the client is done with sending
the data and we have the data in the inNetBuffer and it never gets copied
to the appBuffer

       if (!handshakeComplete) {
           handshake(nextFilter);
       } else {
           decrypt(nextFilter);
       }

Regards,
Jana


On Fri, May 9, 2008 at 5:33 PM, Janardhanan Vembunarayanan <
[EMAIL PROTECTED]> wrote:

Hi,

I have updated the bug https://issues.apache.org/jira/browse/DIRMINA-580with the stack trace for that session.

The client is sending the data but the SSL State on the Mina Server is
not correct.

The snippet from the attachment is given below.

503sessionid = 82 Data Read:
[EMAIL PROTECTED] (HeapBuffer[pos=0
lim=110 cap=1024: 16 03 01 00 69 01 00 00 65 03 01 48 24 8C

98 14 3A D2 D3 50 A0 99 B7 EF 00 73 3F 96 FE 73 4B 50 90 3E 2D 58 D7 F4 4D FB F0 45 46 20 48 24 8C 98 76 22 71 CA C5 6C 41 CA 67 1E 43 CF 24 1D 40
F8 C5 C7

FE 99 C5 3B F1 01 7E 1A B5 A5 00 1E 00 04 00 05 00 2F 00 33 00 32 00 0A
00 16 00 13 00 09 00 15 00 12 00 03 00 08 00 14 00 11 01 00])null

503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=110
cap=16665]null
503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330
cap=33330]null

503sessionid = 82 write outNetBuffer: java.nio.DirectByteBuffer[pos=0
lim=79 cap=16665]null
503sessionid = 82 session write: HeapBuffer[pos=0 lim=79 cap=79: 16 03 01 00 4A 02 00 00 46 03 01 48 24 8C 98 C6 2F B8 7B 3C 62 72 16 8E 46 11 61 3F
DA A3 B0

5D 83 10 03 25 59 7A 77 1A D2 7C 09 20 48 24 8C 98 76 22 71 CA C5 6C 41 CA 67 1E 43 CF 24 1D 40 F8 C5 C7 FE 99 C5 3B F1 01 7E 1A B5 A5 00 04 00]null

503sessionid = 82 Wrap res:Status = OK HandshakeStatus = NEED_UNWRAP 503sessionid = 82 write outNetBuffer: java.nio.DirectByteBuffer[pos=0
lim=37 cap=16665]null
503sessionid = 82 session write: HeapBuffer[pos=0 lim=37 cap=37: 16 03 01 00 20 FD 69 12 21 D6 10 D7 C8 23 65 37 A5 08 5D DF E6 0C DF 17 14 5D 51 5B
A9 07 A1

7C B7 22 50 2C E0]null

503sessionid = 82 Data Read:
[EMAIL PROTECTED] (HeapBuffer[pos=0
lim=6 cap=1024: 14 03 01 00 01 01])null
503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=6
cap=16665]null
503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330
cap=33330]null


503sessionid = 82 Data Read:
[EMAIL PROTECTED] (HeapBuffer[pos=0
lim=512 cap=512: 16 03 01 00 20 86 E4 DA BC C8 EA 3F 29 D8

2E 29 46 16 02 1F F0 47 93 0A 90 BB 95 B2 12 87 06 EA 6C 2E 6E 31 CD 17 03 01 04 88 0D 19 20 07 F4 1A E0 E2 19 4C 5B E6 A8 D4 B9 71 07 75 1E 3F 20
DF F9 E7

8E EE 2D 17 8C FA CE 8E 55 CC 4C DC DA D8 22 8B 15 D3 DD D6 12 25 5B 11 C2 E1 38 B6 D3 7A 91 DD 0A 25 91 08 E9 63 FF 57 54 12 47 53 DE 30 6D 2F 66
95 D6 2D

29 17 8B 40 C7 E9 C7 7A E8 79 25 AB D2 B4 0D CB 03 3E 7E 6B 62 A7 49 FC F5 7A DB F0 B4 8F 40 D3 20 DD 75 55 11 2C 6C 67 89 10 8E F4 F9 21 F7 72 E4
43 B6 77

9C FA 64 17 D4 84 9C 49 56 3C A5 BA 0A B9 E4 CA CA F8 3D 04 64 BA D2 50 18 00 95 59 3D F2 45 09 C3 21 B6 14 C0 7A CC E8 CD 7A 73 F9 B3 72 B5 6D A5
90 F0 21

31 AB A3 47 CD 3E DA D9 76 DF 97 7F FA B9 DC F3 AA 8D A4 92 2D 7D DB 27 BB 51 1D D2 FF 42 0F 32 AD 3B BE F2 11 03 05 4C AB 6B FC 1E 4D 99 9D 5D 90
A5 5C FD

03 39 D8 8D 58 74 16 16 49 7D 96 F5 7E 28 43 9D 80 74 18 B2 2D B1 C8 E8 1B 8E 81 05 43 D1 89 6F B1 64 08 8D EC 73 F6 B2 64 48 F7 7C DC 7A 10 F4 AF
EB D0 14

35 5E DB 24 9F DC 27 4F E1 D8 CB 22 15 14 3A 81 C4 D8 8F 44 C7 3D DC 9D B1 AE B5 FF 97 6B 9A A0 2C 6D AE 93 22 22 DB F3 8C FF 6B 06 27 FB C8 65 FB
C7 7F E0

D4 06 CD 04 D1 60 F8 12 EE C9 21 63 BB 39 BD A7 84 F6 34 C5 67 B2 43 32 1E E2 B3 99 EB C0 48 D4 77 D5 64 DF A9 41 4D 4A E4 FD 45 E9 E0 AB B1 4B F6
8E 71 CF

B7 C0 3C 5F 1A C8 65 5E 3D BA 52 27 4A B2 05 CF 38 30 81 3E 84 BE 4D 47 C5 72 29 1C 14 85 1F 2B 85 59 EA D8 DB 99 7E 5D 2B 93 49 27 61 F6 55 EF 31
96 A8 C3

6D 2E 57 AC 62 76 6A D9 5B 1D 8C FD 0D 27 A8 8A BE 09 6F EA EA AC 59 86
05 9D 24 6F 56 C3])null


503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 lim=512
cap=16665]null
503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330
cap=33330]null

503sessionid = 82 Unwrap res:Status = OK HandshakeStatus = FINISHED
503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=37 lim=512
cap=16665]null
503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 lim=33330
cap=33330]null
1210354840435 sslhandler unwrap0 503sessionid = 82
1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus =
NOT_HANDSHAKING status = BUFFER_UNDERFLOW
503sessionid = 82 Unwrap res:Status = BUFFER_UNDERFLOW HandshakeStatus =
NOT_HANDSHAKING
1210354840435 sslfilter mr 503sessionid = 82

503sessionid = 82 Data Read:
[EMAIL PROTECTED] (HeapBuffer[pos=0
lim=690 cap=1024: 35 CD B0 6A 74 E6 00 08 31 CA D5 F5 97 3C

F3 87 2F A9 6A 05 1C 75 48 14 A8 51 D9 54 D7 6F B8 22 89 0E 14 96 89 6F E9 35 F4 93 0B A7 F3 26 8B 66 F5 72 99 1A 37 6E B6 19 DA CE 88 5B 78 79 E3
E4 93 6B

35 F2 68 D5 43 2D 8C D6 30 85 25 87 C0 C1 F3 5E 1D AB EF 42 6F 92 90 D3 B7 C3 3A 24 1E 80 63 5A B7 A9 00 25 79 59 92 8F 36 0E DE AF 9C 15 8E 40 6C
BA AF 4A

22 0D 63 67 FB 24 2C 0F 70 95 7F 68 1D C1 98 4A 2C 81 FA 7C 6A 73 95 1D E8 C2 D2 FD 10 0F 8E 43 8F AE F8 E2 59 49 16 45 CE B2 38 1E 77 C8 FE 1D 49
78 0A A2

D6 60 44 2C 4F 8F 80 67 CC 6A 3E FA 10 A8 3D DF F0 AD 1A E7 00 69 D8 F3 14 71 BD 4D 99 95 3C AC CE BF 7B 66 3B 4E 59 E2 68 48 E8 ED 48 9C 33 3B 41
3C 9A F5

C3 47 6C 8E E3 20 94 F3 86 F2 9F 36 82 D8 2F D0 71 07 0B AC 69 31 57 EC 06 D3 A7 62 7B 49 60 A9 2E 3A 49 CB 28 90 A0 CD 7A A4 7C 37 B6 6B C5 6E 20
C6 5E 97

39 47 F1 B8 6A AF DD 03 04 DC 21 B7 BB A7 7D BF 09 B6 FA 43 32 F9 FF ED 49 7C 15 99 83 4A BD 3A EC E3 03 FC 0B 83 08 01 E9 4F 8C 86 C7 37 E2 81 D7
D5 00 2F

A4 34 DB 3C 6B 5D 65 7C 53 AF 22 1B FB CE 3A C4 76 D8 14 C9 4A C6 35 90 0B 0D D2 F1 10 A5 E7 1A 8C 8E FA B1 93 47 E6 67 AF 6F 10 7A 77 05 78 9A C5
43 C8 0E

81 78 57 A5 31 44 09 1C A7 48 17 DD 2B B4 B2 29 1D B9 2B 0C DD 23 84 1F F7 44 1C A1 CE 64 D5 B1 78 EB 2A 04 20 4D 26 63 6B 22 58 4D 1F 3C 1D 95 CF
C8 B2 04

29 23 6E DD 06 BD 7D BD A1 94 62 55 86 4E 32 F4 82 89 7F C5 C6 87 0A 8E E6 CB DA F4 5D AA 25 DB 2D 56 14 62 C9 79 86 B8 64 F9 26 62 D8 A7 24 4D 0D
82 27 08

FA 75 D7 80 D0 E7 27 CA E7 AE 3C 8B 9E F9 92 A3 80 58 A7 5E CE 52 19 18 77 F5 09 44 B8 9C 59 DD 29 FB 45 9B 7D B4 36 86 52 53 C0 23 3A 83 B6 F6 B9
73 D2 08

56 EA A5 84 3F A7 34 21 A6 96 88 E3 41 9B D7 8F 84 6B F6 97 DD 99 F7 20 36 FA BD 8E 93 A2 A4 B8 8A 98 74 5C D5 BA 26 E3 8F 8C EB 00 53 F2 A3 78 87
9E FF C4

62 36 99 7A F8 10 EF F8 2F 74 F4 66 5B BE 9E 7F 3A 14 59 9D 91 A6 7E 8A F3 55 7A A7 60 A6 BD 24 02 D3 59 FA 7D B5 6A 8C A9 56 71 CD 0B C3 20 26 0E
F2 9A 66

56 92 4F F6 0F 04 D6 72 64 3C 83 AB 5C D0 2A 5B 90 CA BF 2F 37 62 7F 1E 97 16 10 AA 3E D9 36 B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29 70 36 67
E3 B3

B2])null

This is not read back into the iNetBuffer even though the client is
sending the data to the server

Jana


On Fri, May 9, 2008 at 5:00 PM, Kyle Sampson <[EMAIL PROTECTED]>
wrote:

Janardhanan,

It's certainly possible that this same problem is on the 1.0.x branch as well, though I haven't tested it. The JIRA bug indicates that it affected 1.0.3 and was fixed in 1.0.4, but like the 1.1.x branch it may have snuck
back in (assuming again that this is in fact the problem).

I found this post with the same issue from June 2007:
http://markmail.org/message/i4p374325cwnno66. I tried using the JAR file provided by Trustin, and it worked. Not sure if this related to that
JIRA bug.


On May 9, 2008, at 4:00 PM, Janardhanan Vembunarayanan wrote:

Hi Kyle,

I am seeing SSL issues on 1.0.9 is this is an issue in this branch as
well?
The issue is connection gets established and after which the data is
not
read.
I have given the handshake information below.

1210272744747 sslfilter mr 503sessionid = 25
1210272744747 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_UNWRAP handshakeComplete = false
1210272744747 sslhandler unwrapHandshake 503sessionid = 25
1210272744747 sslhandler unwrap0 503sessionid = 25
1210272744747 sslhandler unwrap0 503sessionid = 25 handshakestatus =
NEED_TASK status = OK
1210272744747 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_TASK handshakeComplete = false
1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_WRAP handshakeComplete = false
1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_WRAP handshakeComplete = false
1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_WRAP handshakeComplete = false
1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_UNWRAP handshakeComplete = false
1210272744749 sslhandler unwrapHandshake 503sessionid = 25
1210272744749 sslhandler unwrap0 503sessionid = 25
1210272744749 sslhandler unwrap0 503sessionid = 25 handshakestatus =
NEED_UNWRAP status = BUFFER_UNDERFLOW
1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_UNWRAP handshakeComplete = false
1210272744749 sslhandler unwrapHandshake 503sessionid = 25
1210272744749 sslhandler unwrap0 503sessionid = 25
1210272744749 sslhandler unwrap0 503sessionid = 25 handshakestatus =
NEED_UNWRAP status = BUFFER_UNDERFLOW
1210272744749 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_UNWRAP handshakeComplete = false
1210272744749 sslhandler unwrapHandshake 503sessionid = 25
1210272744749 sslhandler unwrap0 503sessionid = 25
1210272744749 sslhandler unwrap0 503sessionid = 25 handshakestatus =
NEED_UNWRAP status = BUFFER_UNDERFLOW

1210272744751 sslfilter mr 503sessionid = 25
1210272744751 sslhandler handshake 503sessionid = 25 handshakeStatus =
NEED_UNWRAP handshakeComplete = false
1210272744751 sslhandler unwrapHandshake 503sessionid = 25
1210272744752 sslhandler unwrap0 503sessionid = 25
1210272744752 sslhandler unwrap0 503sessionid = 25 handshakestatus =
NEED_UNWRAP status = OK
1210272744752 sslhandler unwrap0 503sessionid = 25
1210272744752 sslhandler unwrap0 503sessionid = 25 handshakestatus =
FINISHED status = OK
1210272744752 sslhandler unwrap0 503sessionid = 25
1210272744752 sslhandler unwrap0 503sessionid = 25 handshakestatus =
NOT_HANDSHAKING status = BUFFER_UNDERFLOW

1210272744752 sslfilter mr 503sessionid = 25
1210272744752 sslhandler handshake 503sessionid = 25 handshakeStatus =
FINISHED handshakeComplete = false
1210272744752 sslhandler handshake 503sessionid = 25 handshakeStatus =
FINISHED handshakeComplete = true


Regards,
Jana

On Fri, May 9, 2008 at 2:02 PM, Kyle Sampson <[EMAIL PROTECTED]>
wrote:

It does seem to happen in 1.1.7 as well.


On May 9, 2008, at 1:50 PM, Emmanuel Lecharny wrote:

Hi, Kyle,


can you check with the latest releae, 1.1.7 ?

Thanks !

Kyle Sampson wrote:

I'm using MINA 1.1.3.  I added SSLFilter to both the client and
server
in my application, and it seems to hang at some point while
negotiating an
SSL connection.  I found a relevant JIRA issue:
https://issues.apache.org/jira/browse/DIRMINA-390. This seems to
have
been fixed in version 1.1.1.  I tried using the
mina-filter-ssl-1.1.1.jar in place of the 1.1.3 version, and it
works
perfectly. So it seems like whatever change was made to fix this
bug was
reverted in a later version.

Has anyone else had similar problems? This seems to happen only
when you
use SSLFilter along with ProtocolCodecFilter. This may affect only
the
1.1.x branch, I'm not sure.

Kyle Sampson
[EMAIL PROTECTED]






--
--
cordialement, regards,
Emmanuel Lécharny
www.iktek.com
directory.apache.org



Kyle Sampson
[EMAIL PROTECTED]






--
www.vshareride.com
www.pragmaticinvesting.com
www.younag.com


Kyle Sampson
[EMAIL PROTECTED]






--
www.vshareride.com
www.pragmaticinvesting.com
www.younag.com




--
www.vshareride.com
www.pragmaticinvesting.com
www.younag.com




--
www.vshareride.com
www.pragmaticinvesting.com
www.younag.com




--
www.vshareride.com
www.pragmaticinvesting.com
www.younag.com

Kyle Sampson
[EMAIL PROTECTED]



Reply via email to