Hi Kyle,

Thanks for confirming this.

I am cleaner fix for this and update is given below and I have updated the
bug also https://issues.apache.org/jira/browse/DIRMINA-580

The better way to fix this issue is having the following code in the
handshake() after the for(;;) I am setting the handshakeComplete = true if
the handshake status is FINISHED.

The code is given below.

What is actually happening is this

1. Client has sent packet 1 and handshake is not completed
2. Client sent packet 2 and handshake status is FINISHED and since in the
unwrapHandshake method res = unwrap0() is called for the second
     time and which pushes the state to NOT_HANDSHAKING and BUFFER_UNDERFLOW
3. Client sent packet 3 and it gets into the handshake() for(;;) it sets the
handshakeComplete = true and does nothting.

Had the client sent one more packet then you would not have any issue. But
we cannot assume a client to send one more packet after handshakeComplete =
true and I am taking care of this outside the for loop

    public void handshake(NextFilter nextFilter) throws SSLException {
        for (;;) {
           ...
        }

        if(handshakeStatus == SSLEngineResult.HandshakeStatus.FINISHED &&
!handshakeComplete){
            handshakeComplete = true;
                if (!initialHandshakeComplete
                     &&
session.containsAttribute(SSLFilter.USE_NOTIFICATION)) {
                            // SESSION_SECURED is fired only when it's the
first handshake.
                            // (i.e. renegotiation shouldn't trigger
SESSION_SECURED.)
                            initialHandshakeComplete = true;
                            scheduleMessageReceived(nextFilter,
                                    SSLFilter.SESSION_SECURED);
                }
        }

  }




Regards,
Jana

On Mon, May 12, 2008 at 12:15 PM, Kyle Sampson <[EMAIL PROTECTED]> wrote:

> I tried the fix you described, and it solved the problem in 1.1.3.
>
> I've been able to temporarily work around the problem by downgrading to
> 1.1.1, though this is less than ideal.
>
>
> On May 10, 2008, at 8:30 PM, Janardhanan Vembunarayanan wrote:
>
>  Hi,
> >
> > Any updates on this issue
> >
> > Regards,
> > Jana
> >
> > On Fri, May 9, 2008 at 11:11 PM, Janardhanan Vembunarayanan <
> > [EMAIL PROTECTED]> wrote:
> >
> >  Hi All,
> > >
> > > I have updated the bug
> > > https://issues.apache.org/jira/browse/DIRMINA-580
> > >
> > > After adding the following line it worked. But I am not sure if this
> > > is the
> > > right fix But this just to prove that the bug is on the Mina side.
> > >
> > > Please can someone confirm this.
> > >
> > > This is a critical production issue for us.
> > >
> > > //////////////////////////////////////Added this line
> > > decrypt(nextFilter);
> > > //////////////////////////////////////Added this line
> > >
> > > In the SSLHandler.java after adding the following line it worked
> > >
> > >   public void handshake(NextFilter nextFilter) throws SSLException {
> > >       if (SessionLog.isDebugEnabled(session)) {
> > >           SessionLog.debug(session, " doHandshake()");
> > >       }
> > >
> > >       for (;;) {
> > >        System.out.println(System.currentTimeMillis() + " sslhandler
> > > handshake 503sessionid = " + session.getAttribute("503") + "
> > > handshakeStatus
> > > = " + handshakeStatus + " handshakeComplete = " + handshakeComplete);
> > >           if (handshakeStatus ==
> > > SSLEngineResult.HandshakeStatus.FINISHED) {
> > >               session.setAttribute(SSLFilter.SSL_SESSION, sslEngine
> > >                       .getSession());
> > >               if (SessionLog.isDebugEnabled(session)) {
> > >                   SSLSession sslSession = sslEngine.getSession();
> > >                   SessionLog.debug(session,
> > >                           " handshakeStatus=FINISHED");
> > >                   SessionLog.debug(session, " sslSession CipherSuite
> > > used
> > > "
> > >                           + sslSession.getCipherSuite());
> > >               }
> > >               handshakeComplete = true;
> > >               if (!initialHandshakeComplete
> > >                       &&
> > > session.containsAttribute(SSLFilter.USE_NOTIFICATION)) {
> > >                   // SESSION_SECURED is fired only when it's the first
> > > handshake.
> > >                   // (i.e. renegotiation shouldn't trigger
> > > SESSION_SECURED.)
> > >                   initialHandshakeComplete = true;
> > >                   scheduleMessageReceived(nextFilter,
> > >                           SSLFilter.SESSION_SECURED);
> > >               }
> > > //////////////////////////////////////Added this line
> > >               decrypt(nextFilter);
> > > //////////////////////////////////////Added this line
> > >               break;
> > >           }
> > > ...
> > > }
> > >
> > >
> > > Regards,
> > > Jana
> > >
> > >
> > > On Fri, May 9, 2008 at 9:49 PM, Janardhanan Vembunarayanan <
> > > [EMAIL PROTECTED]> wrote:
> > >
> > >  Hi All,
> > > >
> > > > I have given below the step by step analysis of why the data is not
> > > > sent
> > > > down the filter/handler SSLFilter/SSLHandler.
> > > > I have updated the bug on this issue
> > > >
> > > > https://issues.apache.org/jira/browse/DIRMINA-580
> > > >
> > > > 503sessionid = 82 Data Read:
> > > > [EMAIL PROTECTED] (HeapBuffer[pos=0
> > > > lim=512 cap=512: 16 03 01 00 20 86 E4 DA BC C8 EA 3F 29 D8 2E 29 46
> > > > 16 02 1F
> > > > F0 47 93 0A 90 BB 95 B2 12 87 06 EA 6C 2E 6E 31 CD 17 03 01 04 88 0D
> > > > 19 20
> > > > 07 F4 1A E0 E2 19 4C 5B E6 A8 D4 B9 71 07 75 1E 3F 20 DF F9 E7 8E EE
> > > > 2D 17
> > > > 8C FA CE 8E 55 CC 4C DC DA D8 22 8B 15 D3 DD D6 12 25 5B 11 C2 E1 38
> > > > B6 D3
> > > > 7A 91 DD 0A 25 91 08 E9 63 FF 57 54 12 47 53 DE 30 6D 2F 66 95 D6 2D
> > > > 29 17
> > > > 8B 40 C7 E9 C7 7A E8 79 25 AB D2 B4 0D CB 03 3E 7E 6B 62 A7 49 FC F5
> > > > 7A DB
> > > > F0 B4 8F 40 D3 20 DD 75 55 11 2C 6C 67 89 10 8E F4 F9 21 F7 72 E4 43
> > > > B6 77
> > > > 9C FA 64 17 D4 84 9C 49 56 3C A5 BA 0A B9 E4 CA CA F8 3D 04 64 BA D2
> > > > 50 18
> > > > 00 95 59 3D F2 45 09 C3 21 B6 14 C0 7A CC E8 CD 7A 73 F9 B3 72 B5 6D
> > > > A5 90
> > > > F0 21 31 AB A3 47 CD 3E DA D9 76 DF 97 7F FA B9 DC F3 AA 8D A4 92 2D
> > > > 7D DB
> > > > 27 BB 51 1D D2 FF 42 0F 32 AD 3B BE F2 11 03 05 4C AB 6B FC 1E 4D 99
> > > > 9D 5D
> > > > 90 A5 5C FD 03 39 D8 8D 58 74 16 16 49 7D 96 F5 7E 28 43 9D 80 74 18
> > > > B2 2D
> > > > B1 C8 E8 1B 8E 81 05 43 D1 89 6F B1 64 08 8D EC 73 F6 B2 64 48 F7 7C
> > > > DC 7A
> > > > 10 F4 AF EB D0 14 35 5E DB 24 9F DC 27 4F E1 D8 CB 22 15 14 3A 81 C4
> > > > D8 8F
> > > > 44 C7 3D DC 9D B1 AE B5 FF 97 6B 9A A0 2C 6D AE 93 22 22 DB F3 8C FF
> > > > 6B 06
> > > > 27 FB C8 65 FB C7 7F E0 D4 06 CD 04 D1 60 F8 12 EE C9 21 63 BB 39 BD
> > > > A7 84
> > > > F6 34 C5 67 B2 43 32 1E E2 B3 99 EB C0 48 D4 77 D5 64 DF A9 41 4D 4A
> > > > E4 FD
> > > > 45 E9 E0 AB B1 4B F6 8E 71 CF B7 C0 3C 5F 1A C8 65 5E 3D BA 52 27 4A
> > > > B2 05
> > > > CF 38 30 81 3E 84 BE 4D 47 C5 72 29 1C 14 85 1F 2B 85 59 EA D8 DB 99
> > > > 7E 5D
> > > > 2B 93 49 27 61 F6 55 EF 31 96 A8 C3 6D 2E 57 AC 62 76 6A D9 5B 1D 8C
> > > > FD 0D
> > > > 27 A8 8A BE 09 6F EA EA AC 59 86 05 9D 24 6F 56 C3])null
> > > >
> > > > At this stage the information is copied
> > > >
> > > > 503sessionid = 82   inNetBuffer: java.nio.DirectByteBuffer[pos=0
> > > > lim=512
> > > > cap=16665]null
> > > > 503sessionid = 82   appBuffer: java.nio.DirectByteBuffer[pos=0
> > > > lim=33330
> > > > cap=33330]null
> > > >
> > > > and the status moves to FINISHED and OK
> > > >
> > > > 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus =
> > > > FINISHED status = OK
> > > >
> > > > At this stage it is in the method unwrapHandshake it gets into the
> > > > method
> > > > which calls unwrap0 again and the status
> > > > moves to NOT_HANDSHAKING and BUFFER_UNDERFLOW. After this the
> > > > inNetBuffer
> > > > is compacted and this will cause the
> > > > method handshake() to break from the for(;;) loop
> > > >
> > > > At this stage the buffer look like this
> > > >
> > > > 503sessionid = 82   inNetBuffer: java.nio.DirectByteBuffer[pos=37
> > > > lim=512
> > > > cap=16665]null
> > > > 503sessionid = 82   appBuffer: java.nio.DirectByteBuffer[pos=0
> > > > lim=33330
> > > > cap=33330]null
> > > >
> > > > 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus =
> > > > NOT_HANDSHAKING status = BUFFER_UNDERFLOW
> > > >
> > > >        // If handshake finished, no data was produced, and the
> > > > status is
> > > > still ok,
> > > >       // try to unwrap more
> > > >       if (handshakeStatus ==
> > > > SSLEngineResult.HandshakeStatus.FINISHED
> > > >               && res.getStatus() == SSLEngineResult.Status.OK
> > > >               && inNetBuffer.hasRemaining()) {
> > > >           res = unwrap0();
> > > >
> > > >           // prepare to be written again
> > > >           inNetBuffer.compact();
> > > >
> > > >           renegotiateIfNeeded(nextFilter, res);
> > > >       }
> > > >
> > > > After this the client sends its next set of messages as given below.
> > > >
> > > > 503sessionid = 82 Data Read:
> > > > [EMAIL PROTECTED] (HeapBuffer[pos=0
> > > > lim=690 cap=1024: 35 CD B0 6A 74 E6 00 08 31 CA D5 F5 97 3C F3 87 2F
> > > > A9 6A
> > > > 05 1C 75 48 14 A8 51 D9 54 D7 6F B8 22 89 0E 14 96 89 6F E9 35 F4 93
> > > > 0B A7
> > > > F3 26 8B 66 F5 72 99 1A 37 6E B6 19 DA CE 88 5B 78 79 E3 E4 93 6B 35
> > > > F2 68
> > > > D5 43 2D 8C D6 30 85 25 87 C0 C1 F3 5E 1D AB EF 42 6F 92 90 D3 B7 C3
> > > > 3A 24
> > > > 1E 80 63 5A B7 A9 00 25 79 59 92 8F 36 0E DE AF 9C 15 8E 40 6C BA AF
> > > > 4A 22
> > > > 0D 63 67 FB 24 2C 0F 70 95 7F 68 1D C1 98 4A 2C 81 FA 7C 6A 73 95 1D
> > > > E8 C2
> > > > D2 FD 10 0F 8E 43 8F AE F8 E2 59 49 16 45 CE B2 38 1E 77 C8 FE 1D 49
> > > > 78 0A
> > > > A2 D6 60 44 2C 4F 8F 80 67 CC 6A 3E FA 10 A8 3D DF F0 AD 1A E7 00 69
> > > > D8 F3
> > > > 14 71 BD 4D 99 95 3C AC CE BF 7B 66 3B 4E 59 E2 68 48 E8 ED 48 9C 33
> > > > 3B 41
> > > > 3C 9A F5 C3 47 6C 8E E3 20 94 F3 86 F2 9F 36 82 D8 2F D0 71 07 0B AC
> > > > 69 31
> > > > 57 EC 06 D3 A7 62 7B 49 60 A9 2E 3A 49 CB 28 90 A0 CD 7A A4 7C 37 B6
> > > > 6B C5
> > > > 6E 20 C6 5E 97 39 47 F1 B8 6A AF DD 03 04 DC 21 B7 BB A7 7D BF 09 B6
> > > > FA 43
> > > > 32 F9 FF ED 49 7C 15 99 83 4A BD 3A EC E3 03 FC 0B 83 08 01 E9 4F 8C
> > > > 86 C7
> > > > 37 E2 81 D7 D5 00 2F A4 34 DB 3C 6B 5D 65 7C 53 AF 22 1B FB CE 3A C4
> > > > 76 D8
> > > > 14 C9 4A C6 35 90 0B 0D D2 F1 10 A5 E7 1A 8C 8E FA B1 93 47 E6 67 AF
> > > > 6F 10
> > > > 7A 77 05 78 9A C5 43 C8 0E 81 78 57 A5 31 44 09 1C A7 48 17 DD 2B B4
> > > > B2 29
> > > > 1D B9 2B 0C DD 23 84 1F F7 44 1C A1 CE 64 D5 B1 78 EB 2A 04 20 4D 26
> > > > 63 6B
> > > > 22 58 4D 1F 3C 1D 95 CF C8 B2 04 29 23 6E DD 06 BD 7D BD A1 94 62 55
> > > > 86 4E
> > > > 32 F4 82 89 7F C5 C6 87 0A 8E E6 CB DA F4 5D AA 25 DB 2D 56 14 62 C9
> > > > 79 86
> > > > B8 64 F9 26 62 D8 A7 24 4D 0D 82 27 08 FA 75 D7 80 D0 E7 27 CA E7 AE
> > > > 3C 8B
> > > > 9E F9 92 A3 80 58 A7 5E CE 52 19 18 77 F5 09 44 B8 9C 59 DD 29 FB 45
> > > > 9B 7D
> > > > B4 36 86 52 53 C0 23 3A 83 B6 F6 B9 73 D2 08 56 EA A5 84 3F A7 34 21
> > > > A6 96
> > > > 88 E3 41 9B D7 8F 84 6B F6 97 DD 99 F7 20 36 FA BD 8E 93 A2 A4 B8 8A
> > > > 98 74
> > > > 5C D5 BA 26 E3 8F 8C EB 00 53 F2 A3 78 87 9E FF C4 62 36 99 7A F8 10
> > > > EF F8
> > > > 2F 74 F4 66 5B BE 9E 7F 3A 14 59 9D 91 A6 7E 8A F3 55 7A A7 60 A6 BD
> > > > 24 02
> > > > D3 59 FA 7D B5 6A 8C A9 56 71 CD 0B C3 20 26 0E F2 9A 66 56 92 4F F6
> > > > 0F 04
> > > > D6 72 64 3C 83 AB 5C D0 2A 5B 90 CA BF 2F 37 62 7F 1E 97 16 10 AA 3E
> > > > D9 36
> > > > B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29 70 36 67 E3 B3 B2])null
> > > >
> > > >
> > > > So we already have 476 bytes and then we are getting 690 bytes.
> > > >
> > > > Now in the handshake() method we have
> > > >
> > > > 1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus
> > > > =
> > > > FINISHED handshakeComplete = false
> > > >
> > > > This gets into the block and the state is
> > > >
> > > > 1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus
> > > > =
> > > > FINISHED handshakeComplete = true
> > > >
> > > >   for(;;;)
> > > >            if (handshakeStatus ==
> > > > SSLEngineResult.HandshakeStatus.FINISHED) {
> > > >               session.setAttribute(SSLFilter.SSL_SESSION,
> > > > sslEngine.getSession());
> > > >               handshakeComplete = true;
> > > >       ...
> > > >               break;
> > > >           }
> > > >           ...
> > > >
> > > > But at this point we have all the data but we are not doing anything
> > > > with
> > > > the data and sitting there until the idle timeout
> > > > gets triggered and this is the issue in this case
> > > >
> > > > Thus in the method messageReceived of SSLHandler the decrypt method
> > > > never
> > > > gets called as the client is done with sending
> > > > the data and we have the data in the inNetBuffer and it never gets
> > > > copied
> > > > to the appBuffer
> > > >
> > > >       if (!handshakeComplete) {
> > > >           handshake(nextFilter);
> > > >       } else {
> > > >           decrypt(nextFilter);
> > > >       }
> > > >
> > > > Regards,
> > > > Jana
> > > >
> > > >
> > > > On Fri, May 9, 2008 at 5:33 PM, Janardhanan Vembunarayanan <
> > > > [EMAIL PROTECTED]> wrote:
> > > >
> > > >  Hi,
> > > > >
> > > > > I have updated the bug
> > > > > https://issues.apache.org/jira/browse/DIRMINA-580with the stack
> > > > > trace for that session.
> > > > >
> > > > >
> > > > > The client is sending the data but the SSL State on the Mina
> > > > > Server is
> > > > > not correct.
> > > > >
> > > > > The snippet from the attachment is given below.
> > > > >
> > > > > 503sessionid = 82 Data Read:
> > > > > [EMAIL PROTECTED](HeapBuffer[pos=0
> > > > > lim=110 cap=1024: 16 03 01 00 69 01 00 00 65 03 01 48 24 8C
> > > > >
> > > > > 98 14 3A D2 D3 50 A0 99 B7 EF 00 73 3F 96 FE 73 4B 50 90 3E 2D 58
> > > > > D7 F4
> > > > > 4D FB F0 45 46 20 48 24 8C 98 76 22 71 CA C5 6C 41 CA 67 1E 43 CF
> > > > > 24 1D 40
> > > > > F8 C5 C7
> > > > >
> > > > > FE 99 C5 3B F1 01 7E 1A B5 A5 00 1E 00 04 00 05 00 2F 00 33 00 32
> > > > > 00 0A
> > > > > 00 16 00 13 00 09 00 15 00 12 00 03 00 08 00 14 00 11 01 00])null
> > > > >
> > > > > 503sessionid = 82   inNetBuffer: java.nio.DirectByteBuffer[pos=0
> > > > > lim=110
> > > > > cap=16665]null
> > > > > 503sessionid = 82   appBuffer: java.nio.DirectByteBuffer[pos=0
> > > > > lim=33330
> > > > > cap=33330]null
> > > > >
> > > > > 503sessionid = 82 write outNetBuffer:
> > > > > java.nio.DirectByteBuffer[pos=0
> > > > > lim=79 cap=16665]null
> > > > > 503sessionid = 82 session write: HeapBuffer[pos=0 lim=79 cap=79:
> > > > > 16 03 01
> > > > > 00 4A 02 00 00 46 03 01 48 24 8C 98 C6 2F B8 7B 3C 62 72 16 8E 46
> > > > > 11 61 3F
> > > > > DA A3 B0
> > > > >
> > > > > 5D 83 10 03 25 59 7A 77 1A D2 7C 09 20 48 24 8C 98 76 22 71 CA C5
> > > > > 6C 41
> > > > > CA 67 1E 43 CF 24 1D 40 F8 C5 C7 FE 99 C5 3B F1 01 7E 1A B5 A5 00
> > > > > 04 00]null
> > > > >
> > > > > 503sessionid = 82 Wrap res:Status = OK HandshakeStatus =
> > > > > NEED_UNWRAP
> > > > > 503sessionid = 82 write outNetBuffer:
> > > > > java.nio.DirectByteBuffer[pos=0
> > > > > lim=37 cap=16665]null
> > > > > 503sessionid = 82 session write: HeapBuffer[pos=0 lim=37 cap=37:
> > > > > 16 03 01
> > > > > 00 20 FD 69 12 21 D6 10 D7 C8 23 65 37 A5 08 5D DF E6 0C DF 17 14
> > > > > 5D 51 5B
> > > > > A9 07 A1
> > > > >
> > > > > 7C B7 22 50 2C E0]null
> > > > >
> > > > > 503sessionid = 82 Data Read:
> > > > > [EMAIL PROTECTED](HeapBuffer[pos=0
> > > > > lim=6 cap=1024: 14 03 01 00 01 01])null
> > > > > 503sessionid = 82   inNetBuffer: java.nio.DirectByteBuffer[pos=0
> > > > > lim=6
> > > > > cap=16665]null
> > > > > 503sessionid = 82   appBuffer: java.nio.DirectByteBuffer[pos=0
> > > > > lim=33330
> > > > > cap=33330]null
> > > > >
> > > > >
> > > > > 503sessionid = 82 Data Read:
> > > > > [EMAIL PROTECTED](HeapBuffer[pos=0
> > > > > lim=512 cap=512: 16 03 01 00 20 86 E4 DA BC C8 EA 3F 29 D8
> > > > >
> > > > > 2E 29 46 16 02 1F F0 47 93 0A 90 BB 95 B2 12 87 06 EA 6C 2E 6E 31
> > > > > CD 17
> > > > > 03 01 04 88 0D 19 20 07 F4 1A E0 E2 19 4C 5B E6 A8 D4 B9 71 07 75
> > > > > 1E 3F 20
> > > > > DF F9 E7
> > > > >
> > > > > 8E EE 2D 17 8C FA CE 8E 55 CC 4C DC DA D8 22 8B 15 D3 DD D6 12 25
> > > > > 5B 11
> > > > > C2 E1 38 B6 D3 7A 91 DD 0A 25 91 08 E9 63 FF 57 54 12 47 53 DE 30
> > > > > 6D 2F 66
> > > > > 95 D6 2D
> > > > >
> > > > > 29 17 8B 40 C7 E9 C7 7A E8 79 25 AB D2 B4 0D CB 03 3E 7E 6B 62 A7
> > > > > 49 FC
> > > > > F5 7A DB F0 B4 8F 40 D3 20 DD 75 55 11 2C 6C 67 89 10 8E F4 F9 21
> > > > > F7 72 E4
> > > > > 43 B6 77
> > > > >
> > > > > 9C FA 64 17 D4 84 9C 49 56 3C A5 BA 0A B9 E4 CA CA F8 3D 04 64 BA
> > > > > D2 50
> > > > > 18 00 95 59 3D F2 45 09 C3 21 B6 14 C0 7A CC E8 CD 7A 73 F9 B3 72
> > > > > B5 6D A5
> > > > > 90 F0 21
> > > > >
> > > > > 31 AB A3 47 CD 3E DA D9 76 DF 97 7F FA B9 DC F3 AA 8D A4 92 2D 7D
> > > > > DB 27
> > > > > BB 51 1D D2 FF 42 0F 32 AD 3B BE F2 11 03 05 4C AB 6B FC 1E 4D 99
> > > > > 9D 5D 90
> > > > > A5 5C FD
> > > > >
> > > > > 03 39 D8 8D 58 74 16 16 49 7D 96 F5 7E 28 43 9D 80 74 18 B2 2D B1
> > > > > C8 E8
> > > > > 1B 8E 81 05 43 D1 89 6F B1 64 08 8D EC 73 F6 B2 64 48 F7 7C DC 7A
> > > > > 10 F4 AF
> > > > > EB D0 14
> > > > >
> > > > > 35 5E DB 24 9F DC 27 4F E1 D8 CB 22 15 14 3A 81 C4 D8 8F 44 C7 3D
> > > > > DC 9D
> > > > > B1 AE B5 FF 97 6B 9A A0 2C 6D AE 93 22 22 DB F3 8C FF 6B 06 27 FB
> > > > > C8 65 FB
> > > > > C7 7F E0
> > > > >
> > > > > D4 06 CD 04 D1 60 F8 12 EE C9 21 63 BB 39 BD A7 84 F6 34 C5 67 B2
> > > > > 43 32
> > > > > 1E E2 B3 99 EB C0 48 D4 77 D5 64 DF A9 41 4D 4A E4 FD 45 E9 E0 AB
> > > > > B1 4B F6
> > > > > 8E 71 CF
> > > > >
> > > > > B7 C0 3C 5F 1A C8 65 5E 3D BA 52 27 4A B2 05 CF 38 30 81 3E 84 BE
> > > > > 4D 47
> > > > > C5 72 29 1C 14 85 1F 2B 85 59 EA D8 DB 99 7E 5D 2B 93 49 27 61 F6
> > > > > 55 EF 31
> > > > > 96 A8 C3
> > > > >
> > > > > 6D 2E 57 AC 62 76 6A D9 5B 1D 8C FD 0D 27 A8 8A BE 09 6F EA EA AC
> > > > > 59 86
> > > > > 05 9D 24 6F 56 C3])null
> > > > >
> > > > >
> > > > > 503sessionid = 82   inNetBuffer: java.nio.DirectByteBuffer[pos=0
> > > > > lim=512
> > > > > cap=16665]null
> > > > > 503sessionid = 82   appBuffer: java.nio.DirectByteBuffer[pos=0
> > > > > lim=33330
> > > > > cap=33330]null
> > > > >
> > > > > 503sessionid = 82 Unwrap res:Status = OK HandshakeStatus =
> > > > > FINISHED
> > > > > 503sessionid = 82   inNetBuffer: java.nio.DirectByteBuffer[pos=37
> > > > > lim=512
> > > > > cap=16665]null
> > > > > 503sessionid = 82   appBuffer: java.nio.DirectByteBuffer[pos=0
> > > > > lim=33330
> > > > > cap=33330]null
> > > > > 1210354840435 sslhandler unwrap0 503sessionid = 82
> > > > > 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus
> > > > > =
> > > > > NOT_HANDSHAKING status = BUFFER_UNDERFLOW
> > > > > 503sessionid = 82 Unwrap res:Status = BUFFER_UNDERFLOW
> > > > > HandshakeStatus =
> > > > > NOT_HANDSHAKING
> > > > > 1210354840435 sslfilter mr 503sessionid = 82
> > > > >
> > > > > 503sessionid = 82 Data Read:
> > > > > [EMAIL PROTECTED](HeapBuffer[pos=0
> > > > > lim=690 cap=1024: 35 CD B0 6A 74 E6 00 08 31 CA D5 F5 97 3C
> > > > >
> > > > > F3 87 2F A9 6A 05 1C 75 48 14 A8 51 D9 54 D7 6F B8 22 89 0E 14 96
> > > > > 89 6F
> > > > > E9 35 F4 93 0B A7 F3 26 8B 66 F5 72 99 1A 37 6E B6 19 DA CE 88 5B
> > > > > 78 79 E3
> > > > > E4 93 6B
> > > > >
> > > > > 35 F2 68 D5 43 2D 8C D6 30 85 25 87 C0 C1 F3 5E 1D AB EF 42 6F 92
> > > > > 90 D3
> > > > > B7 C3 3A 24 1E 80 63 5A B7 A9 00 25 79 59 92 8F 36 0E DE AF 9C 15
> > > > > 8E 40 6C
> > > > > BA AF 4A
> > > > >
> > > > > 22 0D 63 67 FB 24 2C 0F 70 95 7F 68 1D C1 98 4A 2C 81 FA 7C 6A 73
> > > > > 95 1D
> > > > > E8 C2 D2 FD 10 0F 8E 43 8F AE F8 E2 59 49 16 45 CE B2 38 1E 77 C8
> > > > > FE 1D 49
> > > > > 78 0A A2
> > > > >
> > > > > D6 60 44 2C 4F 8F 80 67 CC 6A 3E FA 10 A8 3D DF F0 AD 1A E7 00 69
> > > > > D8 F3
> > > > > 14 71 BD 4D 99 95 3C AC CE BF 7B 66 3B 4E 59 E2 68 48 E8 ED 48 9C
> > > > > 33 3B 41
> > > > > 3C 9A F5
> > > > >
> > > > > C3 47 6C 8E E3 20 94 F3 86 F2 9F 36 82 D8 2F D0 71 07 0B AC 69 31
> > > > > 57 EC
> > > > > 06 D3 A7 62 7B 49 60 A9 2E 3A 49 CB 28 90 A0 CD 7A A4 7C 37 B6 6B
> > > > > C5 6E 20
> > > > > C6 5E 97
> > > > >
> > > > > 39 47 F1 B8 6A AF DD 03 04 DC 21 B7 BB A7 7D BF 09 B6 FA 43 32 F9
> > > > > FF ED
> > > > > 49 7C 15 99 83 4A BD 3A EC E3 03 FC 0B 83 08 01 E9 4F 8C 86 C7 37
> > > > > E2 81 D7
> > > > > D5 00 2F
> > > > >
> > > > > A4 34 DB 3C 6B 5D 65 7C 53 AF 22 1B FB CE 3A C4 76 D8 14 C9 4A C6
> > > > > 35 90
> > > > > 0B 0D D2 F1 10 A5 E7 1A 8C 8E FA B1 93 47 E6 67 AF 6F 10 7A 77 05
> > > > > 78 9A C5
> > > > > 43 C8 0E
> > > > >
> > > > > 81 78 57 A5 31 44 09 1C A7 48 17 DD 2B B4 B2 29 1D B9 2B 0C DD 23
> > > > > 84 1F
> > > > > F7 44 1C A1 CE 64 D5 B1 78 EB 2A 04 20 4D 26 63 6B 22 58 4D 1F 3C
> > > > > 1D 95 CF
> > > > > C8 B2 04
> > > > >
> > > > > 29 23 6E DD 06 BD 7D BD A1 94 62 55 86 4E 32 F4 82 89 7F C5 C6 87
> > > > > 0A 8E
> > > > > E6 CB DA F4 5D AA 25 DB 2D 56 14 62 C9 79 86 B8 64 F9 26 62 D8 A7
> > > > > 24 4D 0D
> > > > > 82 27 08
> > > > >
> > > > > FA 75 D7 80 D0 E7 27 CA E7 AE 3C 8B 9E F9 92 A3 80 58 A7 5E CE 52
> > > > > 19 18
> > > > > 77 F5 09 44 B8 9C 59 DD 29 FB 45 9B 7D B4 36 86 52 53 C0 23 3A 83
> > > > > B6 F6 B9
> > > > > 73 D2 08
> > > > >
> > > > > 56 EA A5 84 3F A7 34 21 A6 96 88 E3 41 9B D7 8F 84 6B F6 97 DD 99
> > > > > F7 20
> > > > > 36 FA BD 8E 93 A2 A4 B8 8A 98 74 5C D5 BA 26 E3 8F 8C EB 00 53 F2
> > > > > A3 78 87
> > > > > 9E FF C4
> > > > >
> > > > > 62 36 99 7A F8 10 EF F8 2F 74 F4 66 5B BE 9E 7F 3A 14 59 9D 91 A6
> > > > > 7E 8A
> > > > > F3 55 7A A7 60 A6 BD 24 02 D3 59 FA 7D B5 6A 8C A9 56 71 CD 0B C3
> > > > > 20 26 0E
> > > > > F2 9A 66
> > > > >
> > > > > 56 92 4F F6 0F 04 D6 72 64 3C 83 AB 5C D0 2A 5B 90 CA BF 2F 37 62
> > > > > 7F 1E
> > > > > 97 16 10 AA 3E D9 36 B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29
> > > > > 70 36 67
> > > > > E3 B3
> > > > >
> > > > > B2])null
> > > > >
> > > > > This is not read back into the iNetBuffer even though the client
> > > > > is
> > > > > sending the data to the server
> > > > >
> > > > > Jana
> > > > >
> > > > >
> > > > > On Fri, May 9, 2008 at 5:00 PM, Kyle Sampson <[EMAIL PROTECTED]>
> > > > > wrote:
> > > > >
> > > > >  Janardhanan,
> > > > > >
> > > > > > It's certainly possible that this same problem is on the 1.0.x
> > > > > > branch as
> > > > > > well, though I haven't tested it.  The JIRA bug indicates that
> > > > > > it affected
> > > > > > 1.0.3 and was fixed in 1.0.4, but like the 1.1.x branch it may
> > > > > > have snuck
> > > > > > back in (assuming again that this is in fact the problem).
> > > > > >
> > > > > > I found this post with the same issue from June 2007:
> > > > > > http://markmail.org/message/i4p374325cwnno66.  I tried using the
> > > > > > JAR
> > > > > > file provided by Trustin, and it worked.  Not sure if this
> > > > > > related to that
> > > > > > JIRA bug.
> > > > > >
> > > > > >
> > > > > > On May 9, 2008, at 4:00 PM, Janardhanan Vembunarayanan wrote:
> > > > > >
> > > > > > Hi Kyle,
> > > > > >
> > > > > > >
> > > > > > > I am seeing SSL issues on 1.0.9 is this is an issue in this
> > > > > > > branch as
> > > > > > > well?
> > > > > > > The issue is connection gets established and after which the
> > > > > > > data is
> > > > > > > not
> > > > > > > read.
> > > > > > > I have given the handshake information below.
> > > > > > >
> > > > > > > 1210272744747 sslfilter mr 503sessionid = 25
> > > > > > > 1210272744747 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_UNWRAP handshakeComplete = false
> > > > > > > 1210272744747 sslhandler unwrapHandshake 503sessionid = 25
> > > > > > > 1210272744747 sslhandler unwrap0 503sessionid = 25
> > > > > > > 1210272744747 sslhandler unwrap0 503sessionid = 25
> > > > > > > handshakestatus =
> > > > > > > NEED_TASK status = OK
> > > > > > > 1210272744747 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_TASK handshakeComplete = false
> > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_WRAP handshakeComplete = false
> > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_WRAP handshakeComplete = false
> > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_WRAP handshakeComplete = false
> > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_UNWRAP handshakeComplete = false
> > > > > > > 1210272744749 sslhandler unwrapHandshake 503sessionid = 25
> > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25
> > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25
> > > > > > > handshakestatus =
> > > > > > > NEED_UNWRAP status = BUFFER_UNDERFLOW
> > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_UNWRAP handshakeComplete = false
> > > > > > > 1210272744749 sslhandler unwrapHandshake 503sessionid = 25
> > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25
> > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25
> > > > > > > handshakestatus =
> > > > > > > NEED_UNWRAP status = BUFFER_UNDERFLOW
> > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_UNWRAP handshakeComplete = false
> > > > > > > 1210272744749 sslhandler unwrapHandshake 503sessionid = 25
> > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25
> > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25
> > > > > > > handshakestatus =
> > > > > > > NEED_UNWRAP status = BUFFER_UNDERFLOW
> > > > > > >
> > > > > > > 1210272744751 sslfilter mr 503sessionid = 25
> > > > > > > 1210272744751 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > NEED_UNWRAP handshakeComplete = false
> > > > > > > 1210272744751 sslhandler unwrapHandshake 503sessionid = 25
> > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25
> > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25
> > > > > > > handshakestatus =
> > > > > > > NEED_UNWRAP status = OK
> > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25
> > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25
> > > > > > > handshakestatus =
> > > > > > > FINISHED status = OK
> > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25
> > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25
> > > > > > > handshakestatus =
> > > > > > > NOT_HANDSHAKING status = BUFFER_UNDERFLOW
> > > > > > >
> > > > > > > 1210272744752 sslfilter mr 503sessionid = 25
> > > > > > > 1210272744752 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > FINISHED handshakeComplete = false
> > > > > > > 1210272744752 sslhandler handshake 503sessionid = 25
> > > > > > > handshakeStatus =
> > > > > > > FINISHED handshakeComplete = true
> > > > > > >
> > > > > > >
> > > > > > > Regards,
> > > > > > > Jana
> > > > > > >
> > > > > > > On Fri, May 9, 2008 at 2:02 PM, Kyle Sampson <
> > > > > > > [EMAIL PROTECTED]>
> > > > > > > wrote:
> > > > > > >
> > > > > > > It does seem to happen in 1.1.7 as well.
> > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > > On May 9, 2008, at 1:50 PM, Emmanuel Lecharny wrote:
> > > > > > > >
> > > > > > > > Hi, Kyle,
> > > > > > > >
> > > > > > > >
> > > > > > > > > can you check with the latest releae, 1.1.7 ?
> > > > > > > > >
> > > > > > > > > Thanks !
> > > > > > > > >
> > > > > > > > > Kyle Sampson wrote:
> > > > > > > > >
> > > > > > > > > I'm using MINA 1.1.3.  I added SSLFilter to both the
> > > > > > > > > client and
> > > > > > > > >
> > > > > > > > > > server
> > > > > > > > > > in my application, and it seems to hang at some point
> > > > > > > > > > while
> > > > > > > > > > negotiating an
> > > > > > > > > > SSL connection.  I found a relevant JIRA issue:
> > > > > > > > > > https://issues.apache.org/jira/browse/DIRMINA-390.  This
> > > > > > > > > > seems to
> > > > > > > > > > have
> > > > > > > > > > been fixed in version 1.1.1.  I tried using the
> > > > > > > > > > mina-filter-ssl-1.1.1.jar in place of the 1.1.3 version,
> > > > > > > > > > and it
> > > > > > > > > > works
> > > > > > > > > > perfectly.  So it seems like whatever change was made to
> > > > > > > > > > fix this
> > > > > > > > > > bug was
> > > > > > > > > > reverted in a later version.
> > > > > > > > > >
> > > > > > > > > > Has anyone else had similar problems?  This seems to
> > > > > > > > > > happen only
> > > > > > > > > > when you
> > > > > > > > > > use SSLFilter along with ProtocolCodecFilter.  This may
> > > > > > > > > > affect only
> > > > > > > > > > the
> > > > > > > > > > 1.1.x branch, I'm not sure.
> > > > > > > > > >
> > > > > > > > > > Kyle Sampson
> > > > > > > > > > [EMAIL PROTECTED]
> > > > > > > > > >
> > > > > > > > > >
> > > > > > > > > >
> > > > > > > > > >
> > > > > > > > > >
> > > > > > > > > >
> > > > > > > > > >  --
> > > > > > > > > --
> > > > > > > > > cordialement, regards,
> > > > > > > > > Emmanuel Lécharny
> > > > > > > > > www.iktek.com
> > > > > > > > > directory.apache.org
> > > > > > > > >
> > > > > > > > >
> > > > > > > > >
> > > > > > > > > Kyle Sampson
> > > > > > > > >
> > > > > > > > [EMAIL PROTECTED]
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > > --
> > > > > > > www.vshareride.com
> > > > > > > www.pragmaticinvesting.com
> > > > > > > www.younag.com
> > > > > > >
> > > > > > >
> > > > > > Kyle Sampson
> > > > > > [EMAIL PROTECTED]
> > > > > >
> > > > > >
> > > > > >
> > > > > >
> > > > > >
> > > > >
> > > > > --
> > > > > www.vshareride.com
> > > > > www.pragmaticinvesting.com
> > > > > www.younag.com
> > > > >
> > > > >
> > > >
> > > >
> > > > --
> > > > www.vshareride.com
> > > > www.pragmaticinvesting.com
> > > > www.younag.com
> > > >
> > > >
> > >
> > >
> > > --
> > > www.vshareride.com
> > > www.pragmaticinvesting.com
> > > www.younag.com
> > >
> > >
> >
> >
> > --
> > www.vshareride.com
> > www.pragmaticinvesting.com
> > www.younag.com
> >
>
> Kyle Sampson
> [EMAIL PROTECTED]
>
>
>
>


-- 
www.vshareride.com
www.pragmaticinvesting.com
www.younag.com

Reply via email to