Hi Kyle, Thanks for confirming this.
I am cleaner fix for this and update is given below and I have updated the bug also https://issues.apache.org/jira/browse/DIRMINA-580 The better way to fix this issue is having the following code in the handshake() after the for(;;) I am setting the handshakeComplete = true if the handshake status is FINISHED. The code is given below. What is actually happening is this 1. Client has sent packet 1 and handshake is not completed 2. Client sent packet 2 and handshake status is FINISHED and since in the unwrapHandshake method res = unwrap0() is called for the second time and which pushes the state to NOT_HANDSHAKING and BUFFER_UNDERFLOW 3. Client sent packet 3 and it gets into the handshake() for(;;) it sets the handshakeComplete = true and does nothting. Had the client sent one more packet then you would not have any issue. But we cannot assume a client to send one more packet after handshakeComplete = true and I am taking care of this outside the for loop public void handshake(NextFilter nextFilter) throws SSLException { for (;;) { ... } if(handshakeStatus == SSLEngineResult.HandshakeStatus.FINISHED && !handshakeComplete){ handshakeComplete = true; if (!initialHandshakeComplete && session.containsAttribute(SSLFilter.USE_NOTIFICATION)) { // SESSION_SECURED is fired only when it's the first handshake. // (i.e. renegotiation shouldn't trigger SESSION_SECURED.) initialHandshakeComplete = true; scheduleMessageReceived(nextFilter, SSLFilter.SESSION_SECURED); } } } Regards, Jana On Mon, May 12, 2008 at 12:15 PM, Kyle Sampson <[EMAIL PROTECTED]> wrote: > I tried the fix you described, and it solved the problem in 1.1.3. > > I've been able to temporarily work around the problem by downgrading to > 1.1.1, though this is less than ideal. > > > On May 10, 2008, at 8:30 PM, Janardhanan Vembunarayanan wrote: > > Hi, > > > > Any updates on this issue > > > > Regards, > > Jana > > > > On Fri, May 9, 2008 at 11:11 PM, Janardhanan Vembunarayanan < > > [EMAIL PROTECTED]> wrote: > > > > Hi All, > > > > > > I have updated the bug > > > https://issues.apache.org/jira/browse/DIRMINA-580 > > > > > > After adding the following line it worked. But I am not sure if this > > > is the > > > right fix But this just to prove that the bug is on the Mina side. > > > > > > Please can someone confirm this. > > > > > > This is a critical production issue for us. > > > > > > //////////////////////////////////////Added this line > > > decrypt(nextFilter); > > > //////////////////////////////////////Added this line > > > > > > In the SSLHandler.java after adding the following line it worked > > > > > > public void handshake(NextFilter nextFilter) throws SSLException { > > > if (SessionLog.isDebugEnabled(session)) { > > > SessionLog.debug(session, " doHandshake()"); > > > } > > > > > > for (;;) { > > > System.out.println(System.currentTimeMillis() + " sslhandler > > > handshake 503sessionid = " + session.getAttribute("503") + " > > > handshakeStatus > > > = " + handshakeStatus + " handshakeComplete = " + handshakeComplete); > > > if (handshakeStatus == > > > SSLEngineResult.HandshakeStatus.FINISHED) { > > > session.setAttribute(SSLFilter.SSL_SESSION, sslEngine > > > .getSession()); > > > if (SessionLog.isDebugEnabled(session)) { > > > SSLSession sslSession = sslEngine.getSession(); > > > SessionLog.debug(session, > > > " handshakeStatus=FINISHED"); > > > SessionLog.debug(session, " sslSession CipherSuite > > > used > > > " > > > + sslSession.getCipherSuite()); > > > } > > > handshakeComplete = true; > > > if (!initialHandshakeComplete > > > && > > > session.containsAttribute(SSLFilter.USE_NOTIFICATION)) { > > > // SESSION_SECURED is fired only when it's the first > > > handshake. > > > // (i.e. renegotiation shouldn't trigger > > > SESSION_SECURED.) > > > initialHandshakeComplete = true; > > > scheduleMessageReceived(nextFilter, > > > SSLFilter.SESSION_SECURED); > > > } > > > //////////////////////////////////////Added this line > > > decrypt(nextFilter); > > > //////////////////////////////////////Added this line > > > break; > > > } > > > ... > > > } > > > > > > > > > Regards, > > > Jana > > > > > > > > > On Fri, May 9, 2008 at 9:49 PM, Janardhanan Vembunarayanan < > > > [EMAIL PROTECTED]> wrote: > > > > > > Hi All, > > > > > > > > I have given below the step by step analysis of why the data is not > > > > sent > > > > down the filter/handler SSLFilter/SSLHandler. > > > > I have updated the bug on this issue > > > > > > > > https://issues.apache.org/jira/browse/DIRMINA-580 > > > > > > > > 503sessionid = 82 Data Read: > > > > [EMAIL PROTECTED] (HeapBuffer[pos=0 > > > > lim=512 cap=512: 16 03 01 00 20 86 E4 DA BC C8 EA 3F 29 D8 2E 29 46 > > > > 16 02 1F > > > > F0 47 93 0A 90 BB 95 B2 12 87 06 EA 6C 2E 6E 31 CD 17 03 01 04 88 0D > > > > 19 20 > > > > 07 F4 1A E0 E2 19 4C 5B E6 A8 D4 B9 71 07 75 1E 3F 20 DF F9 E7 8E EE > > > > 2D 17 > > > > 8C FA CE 8E 55 CC 4C DC DA D8 22 8B 15 D3 DD D6 12 25 5B 11 C2 E1 38 > > > > B6 D3 > > > > 7A 91 DD 0A 25 91 08 E9 63 FF 57 54 12 47 53 DE 30 6D 2F 66 95 D6 2D > > > > 29 17 > > > > 8B 40 C7 E9 C7 7A E8 79 25 AB D2 B4 0D CB 03 3E 7E 6B 62 A7 49 FC F5 > > > > 7A DB > > > > F0 B4 8F 40 D3 20 DD 75 55 11 2C 6C 67 89 10 8E F4 F9 21 F7 72 E4 43 > > > > B6 77 > > > > 9C FA 64 17 D4 84 9C 49 56 3C A5 BA 0A B9 E4 CA CA F8 3D 04 64 BA D2 > > > > 50 18 > > > > 00 95 59 3D F2 45 09 C3 21 B6 14 C0 7A CC E8 CD 7A 73 F9 B3 72 B5 6D > > > > A5 90 > > > > F0 21 31 AB A3 47 CD 3E DA D9 76 DF 97 7F FA B9 DC F3 AA 8D A4 92 2D > > > > 7D DB > > > > 27 BB 51 1D D2 FF 42 0F 32 AD 3B BE F2 11 03 05 4C AB 6B FC 1E 4D 99 > > > > 9D 5D > > > > 90 A5 5C FD 03 39 D8 8D 58 74 16 16 49 7D 96 F5 7E 28 43 9D 80 74 18 > > > > B2 2D > > > > B1 C8 E8 1B 8E 81 05 43 D1 89 6F B1 64 08 8D EC 73 F6 B2 64 48 F7 7C > > > > DC 7A > > > > 10 F4 AF EB D0 14 35 5E DB 24 9F DC 27 4F E1 D8 CB 22 15 14 3A 81 C4 > > > > D8 8F > > > > 44 C7 3D DC 9D B1 AE B5 FF 97 6B 9A A0 2C 6D AE 93 22 22 DB F3 8C FF > > > > 6B 06 > > > > 27 FB C8 65 FB C7 7F E0 D4 06 CD 04 D1 60 F8 12 EE C9 21 63 BB 39 BD > > > > A7 84 > > > > F6 34 C5 67 B2 43 32 1E E2 B3 99 EB C0 48 D4 77 D5 64 DF A9 41 4D 4A > > > > E4 FD > > > > 45 E9 E0 AB B1 4B F6 8E 71 CF B7 C0 3C 5F 1A C8 65 5E 3D BA 52 27 4A > > > > B2 05 > > > > CF 38 30 81 3E 84 BE 4D 47 C5 72 29 1C 14 85 1F 2B 85 59 EA D8 DB 99 > > > > 7E 5D > > > > 2B 93 49 27 61 F6 55 EF 31 96 A8 C3 6D 2E 57 AC 62 76 6A D9 5B 1D 8C > > > > FD 0D > > > > 27 A8 8A BE 09 6F EA EA AC 59 86 05 9D 24 6F 56 C3])null > > > > > > > > At this stage the information is copied > > > > > > > > 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 > > > > lim=512 > > > > cap=16665]null > > > > 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 > > > > lim=33330 > > > > cap=33330]null > > > > > > > > and the status moves to FINISHED and OK > > > > > > > > 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus = > > > > FINISHED status = OK > > > > > > > > At this stage it is in the method unwrapHandshake it gets into the > > > > method > > > > which calls unwrap0 again and the status > > > > moves to NOT_HANDSHAKING and BUFFER_UNDERFLOW. After this the > > > > inNetBuffer > > > > is compacted and this will cause the > > > > method handshake() to break from the for(;;) loop > > > > > > > > At this stage the buffer look like this > > > > > > > > 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=37 > > > > lim=512 > > > > cap=16665]null > > > > 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 > > > > lim=33330 > > > > cap=33330]null > > > > > > > > 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus = > > > > NOT_HANDSHAKING status = BUFFER_UNDERFLOW > > > > > > > > // If handshake finished, no data was produced, and the > > > > status is > > > > still ok, > > > > // try to unwrap more > > > > if (handshakeStatus == > > > > SSLEngineResult.HandshakeStatus.FINISHED > > > > && res.getStatus() == SSLEngineResult.Status.OK > > > > && inNetBuffer.hasRemaining()) { > > > > res = unwrap0(); > > > > > > > > // prepare to be written again > > > > inNetBuffer.compact(); > > > > > > > > renegotiateIfNeeded(nextFilter, res); > > > > } > > > > > > > > After this the client sends its next set of messages as given below. > > > > > > > > 503sessionid = 82 Data Read: > > > > [EMAIL PROTECTED] (HeapBuffer[pos=0 > > > > lim=690 cap=1024: 35 CD B0 6A 74 E6 00 08 31 CA D5 F5 97 3C F3 87 2F > > > > A9 6A > > > > 05 1C 75 48 14 A8 51 D9 54 D7 6F B8 22 89 0E 14 96 89 6F E9 35 F4 93 > > > > 0B A7 > > > > F3 26 8B 66 F5 72 99 1A 37 6E B6 19 DA CE 88 5B 78 79 E3 E4 93 6B 35 > > > > F2 68 > > > > D5 43 2D 8C D6 30 85 25 87 C0 C1 F3 5E 1D AB EF 42 6F 92 90 D3 B7 C3 > > > > 3A 24 > > > > 1E 80 63 5A B7 A9 00 25 79 59 92 8F 36 0E DE AF 9C 15 8E 40 6C BA AF > > > > 4A 22 > > > > 0D 63 67 FB 24 2C 0F 70 95 7F 68 1D C1 98 4A 2C 81 FA 7C 6A 73 95 1D > > > > E8 C2 > > > > D2 FD 10 0F 8E 43 8F AE F8 E2 59 49 16 45 CE B2 38 1E 77 C8 FE 1D 49 > > > > 78 0A > > > > A2 D6 60 44 2C 4F 8F 80 67 CC 6A 3E FA 10 A8 3D DF F0 AD 1A E7 00 69 > > > > D8 F3 > > > > 14 71 BD 4D 99 95 3C AC CE BF 7B 66 3B 4E 59 E2 68 48 E8 ED 48 9C 33 > > > > 3B 41 > > > > 3C 9A F5 C3 47 6C 8E E3 20 94 F3 86 F2 9F 36 82 D8 2F D0 71 07 0B AC > > > > 69 31 > > > > 57 EC 06 D3 A7 62 7B 49 60 A9 2E 3A 49 CB 28 90 A0 CD 7A A4 7C 37 B6 > > > > 6B C5 > > > > 6E 20 C6 5E 97 39 47 F1 B8 6A AF DD 03 04 DC 21 B7 BB A7 7D BF 09 B6 > > > > FA 43 > > > > 32 F9 FF ED 49 7C 15 99 83 4A BD 3A EC E3 03 FC 0B 83 08 01 E9 4F 8C > > > > 86 C7 > > > > 37 E2 81 D7 D5 00 2F A4 34 DB 3C 6B 5D 65 7C 53 AF 22 1B FB CE 3A C4 > > > > 76 D8 > > > > 14 C9 4A C6 35 90 0B 0D D2 F1 10 A5 E7 1A 8C 8E FA B1 93 47 E6 67 AF > > > > 6F 10 > > > > 7A 77 05 78 9A C5 43 C8 0E 81 78 57 A5 31 44 09 1C A7 48 17 DD 2B B4 > > > > B2 29 > > > > 1D B9 2B 0C DD 23 84 1F F7 44 1C A1 CE 64 D5 B1 78 EB 2A 04 20 4D 26 > > > > 63 6B > > > > 22 58 4D 1F 3C 1D 95 CF C8 B2 04 29 23 6E DD 06 BD 7D BD A1 94 62 55 > > > > 86 4E > > > > 32 F4 82 89 7F C5 C6 87 0A 8E E6 CB DA F4 5D AA 25 DB 2D 56 14 62 C9 > > > > 79 86 > > > > B8 64 F9 26 62 D8 A7 24 4D 0D 82 27 08 FA 75 D7 80 D0 E7 27 CA E7 AE > > > > 3C 8B > > > > 9E F9 92 A3 80 58 A7 5E CE 52 19 18 77 F5 09 44 B8 9C 59 DD 29 FB 45 > > > > 9B 7D > > > > B4 36 86 52 53 C0 23 3A 83 B6 F6 B9 73 D2 08 56 EA A5 84 3F A7 34 21 > > > > A6 96 > > > > 88 E3 41 9B D7 8F 84 6B F6 97 DD 99 F7 20 36 FA BD 8E 93 A2 A4 B8 8A > > > > 98 74 > > > > 5C D5 BA 26 E3 8F 8C EB 00 53 F2 A3 78 87 9E FF C4 62 36 99 7A F8 10 > > > > EF F8 > > > > 2F 74 F4 66 5B BE 9E 7F 3A 14 59 9D 91 A6 7E 8A F3 55 7A A7 60 A6 BD > > > > 24 02 > > > > D3 59 FA 7D B5 6A 8C A9 56 71 CD 0B C3 20 26 0E F2 9A 66 56 92 4F F6 > > > > 0F 04 > > > > D6 72 64 3C 83 AB 5C D0 2A 5B 90 CA BF 2F 37 62 7F 1E 97 16 10 AA 3E > > > > D9 36 > > > > B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29 70 36 67 E3 B3 B2])null > > > > > > > > > > > > So we already have 476 bytes and then we are getting 690 bytes. > > > > > > > > Now in the handshake() method we have > > > > > > > > 1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus > > > > = > > > > FINISHED handshakeComplete = false > > > > > > > > This gets into the block and the state is > > > > > > > > 1210354840435 sslhandler handshake 503sessionid = 82 handshakeStatus > > > > = > > > > FINISHED handshakeComplete = true > > > > > > > > for(;;;) > > > > if (handshakeStatus == > > > > SSLEngineResult.HandshakeStatus.FINISHED) { > > > > session.setAttribute(SSLFilter.SSL_SESSION, > > > > sslEngine.getSession()); > > > > handshakeComplete = true; > > > > ... > > > > break; > > > > } > > > > ... > > > > > > > > But at this point we have all the data but we are not doing anything > > > > with > > > > the data and sitting there until the idle timeout > > > > gets triggered and this is the issue in this case > > > > > > > > Thus in the method messageReceived of SSLHandler the decrypt method > > > > never > > > > gets called as the client is done with sending > > > > the data and we have the data in the inNetBuffer and it never gets > > > > copied > > > > to the appBuffer > > > > > > > > if (!handshakeComplete) { > > > > handshake(nextFilter); > > > > } else { > > > > decrypt(nextFilter); > > > > } > > > > > > > > Regards, > > > > Jana > > > > > > > > > > > > On Fri, May 9, 2008 at 5:33 PM, Janardhanan Vembunarayanan < > > > > [EMAIL PROTECTED]> wrote: > > > > > > > > Hi, > > > > > > > > > > I have updated the bug > > > > > https://issues.apache.org/jira/browse/DIRMINA-580with the stack > > > > > trace for that session. > > > > > > > > > > > > > > > The client is sending the data but the SSL State on the Mina > > > > > Server is > > > > > not correct. > > > > > > > > > > The snippet from the attachment is given below. > > > > > > > > > > 503sessionid = 82 Data Read: > > > > > [EMAIL PROTECTED](HeapBuffer[pos=0 > > > > > lim=110 cap=1024: 16 03 01 00 69 01 00 00 65 03 01 48 24 8C > > > > > > > > > > 98 14 3A D2 D3 50 A0 99 B7 EF 00 73 3F 96 FE 73 4B 50 90 3E 2D 58 > > > > > D7 F4 > > > > > 4D FB F0 45 46 20 48 24 8C 98 76 22 71 CA C5 6C 41 CA 67 1E 43 CF > > > > > 24 1D 40 > > > > > F8 C5 C7 > > > > > > > > > > FE 99 C5 3B F1 01 7E 1A B5 A5 00 1E 00 04 00 05 00 2F 00 33 00 32 > > > > > 00 0A > > > > > 00 16 00 13 00 09 00 15 00 12 00 03 00 08 00 14 00 11 01 00])null > > > > > > > > > > 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 > > > > > lim=110 > > > > > cap=16665]null > > > > > 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 > > > > > lim=33330 > > > > > cap=33330]null > > > > > > > > > > 503sessionid = 82 write outNetBuffer: > > > > > java.nio.DirectByteBuffer[pos=0 > > > > > lim=79 cap=16665]null > > > > > 503sessionid = 82 session write: HeapBuffer[pos=0 lim=79 cap=79: > > > > > 16 03 01 > > > > > 00 4A 02 00 00 46 03 01 48 24 8C 98 C6 2F B8 7B 3C 62 72 16 8E 46 > > > > > 11 61 3F > > > > > DA A3 B0 > > > > > > > > > > 5D 83 10 03 25 59 7A 77 1A D2 7C 09 20 48 24 8C 98 76 22 71 CA C5 > > > > > 6C 41 > > > > > CA 67 1E 43 CF 24 1D 40 F8 C5 C7 FE 99 C5 3B F1 01 7E 1A B5 A5 00 > > > > > 04 00]null > > > > > > > > > > 503sessionid = 82 Wrap res:Status = OK HandshakeStatus = > > > > > NEED_UNWRAP > > > > > 503sessionid = 82 write outNetBuffer: > > > > > java.nio.DirectByteBuffer[pos=0 > > > > > lim=37 cap=16665]null > > > > > 503sessionid = 82 session write: HeapBuffer[pos=0 lim=37 cap=37: > > > > > 16 03 01 > > > > > 00 20 FD 69 12 21 D6 10 D7 C8 23 65 37 A5 08 5D DF E6 0C DF 17 14 > > > > > 5D 51 5B > > > > > A9 07 A1 > > > > > > > > > > 7C B7 22 50 2C E0]null > > > > > > > > > > 503sessionid = 82 Data Read: > > > > > [EMAIL PROTECTED](HeapBuffer[pos=0 > > > > > lim=6 cap=1024: 14 03 01 00 01 01])null > > > > > 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 > > > > > lim=6 > > > > > cap=16665]null > > > > > 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 > > > > > lim=33330 > > > > > cap=33330]null > > > > > > > > > > > > > > > 503sessionid = 82 Data Read: > > > > > [EMAIL PROTECTED](HeapBuffer[pos=0 > > > > > lim=512 cap=512: 16 03 01 00 20 86 E4 DA BC C8 EA 3F 29 D8 > > > > > > > > > > 2E 29 46 16 02 1F F0 47 93 0A 90 BB 95 B2 12 87 06 EA 6C 2E 6E 31 > > > > > CD 17 > > > > > 03 01 04 88 0D 19 20 07 F4 1A E0 E2 19 4C 5B E6 A8 D4 B9 71 07 75 > > > > > 1E 3F 20 > > > > > DF F9 E7 > > > > > > > > > > 8E EE 2D 17 8C FA CE 8E 55 CC 4C DC DA D8 22 8B 15 D3 DD D6 12 25 > > > > > 5B 11 > > > > > C2 E1 38 B6 D3 7A 91 DD 0A 25 91 08 E9 63 FF 57 54 12 47 53 DE 30 > > > > > 6D 2F 66 > > > > > 95 D6 2D > > > > > > > > > > 29 17 8B 40 C7 E9 C7 7A E8 79 25 AB D2 B4 0D CB 03 3E 7E 6B 62 A7 > > > > > 49 FC > > > > > F5 7A DB F0 B4 8F 40 D3 20 DD 75 55 11 2C 6C 67 89 10 8E F4 F9 21 > > > > > F7 72 E4 > > > > > 43 B6 77 > > > > > > > > > > 9C FA 64 17 D4 84 9C 49 56 3C A5 BA 0A B9 E4 CA CA F8 3D 04 64 BA > > > > > D2 50 > > > > > 18 00 95 59 3D F2 45 09 C3 21 B6 14 C0 7A CC E8 CD 7A 73 F9 B3 72 > > > > > B5 6D A5 > > > > > 90 F0 21 > > > > > > > > > > 31 AB A3 47 CD 3E DA D9 76 DF 97 7F FA B9 DC F3 AA 8D A4 92 2D 7D > > > > > DB 27 > > > > > BB 51 1D D2 FF 42 0F 32 AD 3B BE F2 11 03 05 4C AB 6B FC 1E 4D 99 > > > > > 9D 5D 90 > > > > > A5 5C FD > > > > > > > > > > 03 39 D8 8D 58 74 16 16 49 7D 96 F5 7E 28 43 9D 80 74 18 B2 2D B1 > > > > > C8 E8 > > > > > 1B 8E 81 05 43 D1 89 6F B1 64 08 8D EC 73 F6 B2 64 48 F7 7C DC 7A > > > > > 10 F4 AF > > > > > EB D0 14 > > > > > > > > > > 35 5E DB 24 9F DC 27 4F E1 D8 CB 22 15 14 3A 81 C4 D8 8F 44 C7 3D > > > > > DC 9D > > > > > B1 AE B5 FF 97 6B 9A A0 2C 6D AE 93 22 22 DB F3 8C FF 6B 06 27 FB > > > > > C8 65 FB > > > > > C7 7F E0 > > > > > > > > > > D4 06 CD 04 D1 60 F8 12 EE C9 21 63 BB 39 BD A7 84 F6 34 C5 67 B2 > > > > > 43 32 > > > > > 1E E2 B3 99 EB C0 48 D4 77 D5 64 DF A9 41 4D 4A E4 FD 45 E9 E0 AB > > > > > B1 4B F6 > > > > > 8E 71 CF > > > > > > > > > > B7 C0 3C 5F 1A C8 65 5E 3D BA 52 27 4A B2 05 CF 38 30 81 3E 84 BE > > > > > 4D 47 > > > > > C5 72 29 1C 14 85 1F 2B 85 59 EA D8 DB 99 7E 5D 2B 93 49 27 61 F6 > > > > > 55 EF 31 > > > > > 96 A8 C3 > > > > > > > > > > 6D 2E 57 AC 62 76 6A D9 5B 1D 8C FD 0D 27 A8 8A BE 09 6F EA EA AC > > > > > 59 86 > > > > > 05 9D 24 6F 56 C3])null > > > > > > > > > > > > > > > 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=0 > > > > > lim=512 > > > > > cap=16665]null > > > > > 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 > > > > > lim=33330 > > > > > cap=33330]null > > > > > > > > > > 503sessionid = 82 Unwrap res:Status = OK HandshakeStatus = > > > > > FINISHED > > > > > 503sessionid = 82 inNetBuffer: java.nio.DirectByteBuffer[pos=37 > > > > > lim=512 > > > > > cap=16665]null > > > > > 503sessionid = 82 appBuffer: java.nio.DirectByteBuffer[pos=0 > > > > > lim=33330 > > > > > cap=33330]null > > > > > 1210354840435 sslhandler unwrap0 503sessionid = 82 > > > > > 1210354840435 sslhandler unwrap0 503sessionid = 82 handshakestatus > > > > > = > > > > > NOT_HANDSHAKING status = BUFFER_UNDERFLOW > > > > > 503sessionid = 82 Unwrap res:Status = BUFFER_UNDERFLOW > > > > > HandshakeStatus = > > > > > NOT_HANDSHAKING > > > > > 1210354840435 sslfilter mr 503sessionid = 82 > > > > > > > > > > 503sessionid = 82 Data Read: > > > > > [EMAIL PROTECTED](HeapBuffer[pos=0 > > > > > lim=690 cap=1024: 35 CD B0 6A 74 E6 00 08 31 CA D5 F5 97 3C > > > > > > > > > > F3 87 2F A9 6A 05 1C 75 48 14 A8 51 D9 54 D7 6F B8 22 89 0E 14 96 > > > > > 89 6F > > > > > E9 35 F4 93 0B A7 F3 26 8B 66 F5 72 99 1A 37 6E B6 19 DA CE 88 5B > > > > > 78 79 E3 > > > > > E4 93 6B > > > > > > > > > > 35 F2 68 D5 43 2D 8C D6 30 85 25 87 C0 C1 F3 5E 1D AB EF 42 6F 92 > > > > > 90 D3 > > > > > B7 C3 3A 24 1E 80 63 5A B7 A9 00 25 79 59 92 8F 36 0E DE AF 9C 15 > > > > > 8E 40 6C > > > > > BA AF 4A > > > > > > > > > > 22 0D 63 67 FB 24 2C 0F 70 95 7F 68 1D C1 98 4A 2C 81 FA 7C 6A 73 > > > > > 95 1D > > > > > E8 C2 D2 FD 10 0F 8E 43 8F AE F8 E2 59 49 16 45 CE B2 38 1E 77 C8 > > > > > FE 1D 49 > > > > > 78 0A A2 > > > > > > > > > > D6 60 44 2C 4F 8F 80 67 CC 6A 3E FA 10 A8 3D DF F0 AD 1A E7 00 69 > > > > > D8 F3 > > > > > 14 71 BD 4D 99 95 3C AC CE BF 7B 66 3B 4E 59 E2 68 48 E8 ED 48 9C > > > > > 33 3B 41 > > > > > 3C 9A F5 > > > > > > > > > > C3 47 6C 8E E3 20 94 F3 86 F2 9F 36 82 D8 2F D0 71 07 0B AC 69 31 > > > > > 57 EC > > > > > 06 D3 A7 62 7B 49 60 A9 2E 3A 49 CB 28 90 A0 CD 7A A4 7C 37 B6 6B > > > > > C5 6E 20 > > > > > C6 5E 97 > > > > > > > > > > 39 47 F1 B8 6A AF DD 03 04 DC 21 B7 BB A7 7D BF 09 B6 FA 43 32 F9 > > > > > FF ED > > > > > 49 7C 15 99 83 4A BD 3A EC E3 03 FC 0B 83 08 01 E9 4F 8C 86 C7 37 > > > > > E2 81 D7 > > > > > D5 00 2F > > > > > > > > > > A4 34 DB 3C 6B 5D 65 7C 53 AF 22 1B FB CE 3A C4 76 D8 14 C9 4A C6 > > > > > 35 90 > > > > > 0B 0D D2 F1 10 A5 E7 1A 8C 8E FA B1 93 47 E6 67 AF 6F 10 7A 77 05 > > > > > 78 9A C5 > > > > > 43 C8 0E > > > > > > > > > > 81 78 57 A5 31 44 09 1C A7 48 17 DD 2B B4 B2 29 1D B9 2B 0C DD 23 > > > > > 84 1F > > > > > F7 44 1C A1 CE 64 D5 B1 78 EB 2A 04 20 4D 26 63 6B 22 58 4D 1F 3C > > > > > 1D 95 CF > > > > > C8 B2 04 > > > > > > > > > > 29 23 6E DD 06 BD 7D BD A1 94 62 55 86 4E 32 F4 82 89 7F C5 C6 87 > > > > > 0A 8E > > > > > E6 CB DA F4 5D AA 25 DB 2D 56 14 62 C9 79 86 B8 64 F9 26 62 D8 A7 > > > > > 24 4D 0D > > > > > 82 27 08 > > > > > > > > > > FA 75 D7 80 D0 E7 27 CA E7 AE 3C 8B 9E F9 92 A3 80 58 A7 5E CE 52 > > > > > 19 18 > > > > > 77 F5 09 44 B8 9C 59 DD 29 FB 45 9B 7D B4 36 86 52 53 C0 23 3A 83 > > > > > B6 F6 B9 > > > > > 73 D2 08 > > > > > > > > > > 56 EA A5 84 3F A7 34 21 A6 96 88 E3 41 9B D7 8F 84 6B F6 97 DD 99 > > > > > F7 20 > > > > > 36 FA BD 8E 93 A2 A4 B8 8A 98 74 5C D5 BA 26 E3 8F 8C EB 00 53 F2 > > > > > A3 78 87 > > > > > 9E FF C4 > > > > > > > > > > 62 36 99 7A F8 10 EF F8 2F 74 F4 66 5B BE 9E 7F 3A 14 59 9D 91 A6 > > > > > 7E 8A > > > > > F3 55 7A A7 60 A6 BD 24 02 D3 59 FA 7D B5 6A 8C A9 56 71 CD 0B C3 > > > > > 20 26 0E > > > > > F2 9A 66 > > > > > > > > > > 56 92 4F F6 0F 04 D6 72 64 3C 83 AB 5C D0 2A 5B 90 CA BF 2F 37 62 > > > > > 7F 1E > > > > > 97 16 10 AA 3E D9 36 B5 B6 CE F5 3C 04 B0 B8 A3 BF D0 50 92 BF 29 > > > > > 70 36 67 > > > > > E3 B3 > > > > > > > > > > B2])null > > > > > > > > > > This is not read back into the iNetBuffer even though the client > > > > > is > > > > > sending the data to the server > > > > > > > > > > Jana > > > > > > > > > > > > > > > On Fri, May 9, 2008 at 5:00 PM, Kyle Sampson <[EMAIL PROTECTED]> > > > > > wrote: > > > > > > > > > > Janardhanan, > > > > > > > > > > > > It's certainly possible that this same problem is on the 1.0.x > > > > > > branch as > > > > > > well, though I haven't tested it. The JIRA bug indicates that > > > > > > it affected > > > > > > 1.0.3 and was fixed in 1.0.4, but like the 1.1.x branch it may > > > > > > have snuck > > > > > > back in (assuming again that this is in fact the problem). > > > > > > > > > > > > I found this post with the same issue from June 2007: > > > > > > http://markmail.org/message/i4p374325cwnno66. I tried using the > > > > > > JAR > > > > > > file provided by Trustin, and it worked. Not sure if this > > > > > > related to that > > > > > > JIRA bug. > > > > > > > > > > > > > > > > > > On May 9, 2008, at 4:00 PM, Janardhanan Vembunarayanan wrote: > > > > > > > > > > > > Hi Kyle, > > > > > > > > > > > > > > > > > > > > I am seeing SSL issues on 1.0.9 is this is an issue in this > > > > > > > branch as > > > > > > > well? > > > > > > > The issue is connection gets established and after which the > > > > > > > data is > > > > > > > not > > > > > > > read. > > > > > > > I have given the handshake information below. > > > > > > > > > > > > > > 1210272744747 sslfilter mr 503sessionid = 25 > > > > > > > 1210272744747 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_UNWRAP handshakeComplete = false > > > > > > > 1210272744747 sslhandler unwrapHandshake 503sessionid = 25 > > > > > > > 1210272744747 sslhandler unwrap0 503sessionid = 25 > > > > > > > 1210272744747 sslhandler unwrap0 503sessionid = 25 > > > > > > > handshakestatus = > > > > > > > NEED_TASK status = OK > > > > > > > 1210272744747 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_TASK handshakeComplete = false > > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_WRAP handshakeComplete = false > > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_WRAP handshakeComplete = false > > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_WRAP handshakeComplete = false > > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_UNWRAP handshakeComplete = false > > > > > > > 1210272744749 sslhandler unwrapHandshake 503sessionid = 25 > > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25 > > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25 > > > > > > > handshakestatus = > > > > > > > NEED_UNWRAP status = BUFFER_UNDERFLOW > > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_UNWRAP handshakeComplete = false > > > > > > > 1210272744749 sslhandler unwrapHandshake 503sessionid = 25 > > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25 > > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25 > > > > > > > handshakestatus = > > > > > > > NEED_UNWRAP status = BUFFER_UNDERFLOW > > > > > > > 1210272744749 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_UNWRAP handshakeComplete = false > > > > > > > 1210272744749 sslhandler unwrapHandshake 503sessionid = 25 > > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25 > > > > > > > 1210272744749 sslhandler unwrap0 503sessionid = 25 > > > > > > > handshakestatus = > > > > > > > NEED_UNWRAP status = BUFFER_UNDERFLOW > > > > > > > > > > > > > > 1210272744751 sslfilter mr 503sessionid = 25 > > > > > > > 1210272744751 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > NEED_UNWRAP handshakeComplete = false > > > > > > > 1210272744751 sslhandler unwrapHandshake 503sessionid = 25 > > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25 > > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25 > > > > > > > handshakestatus = > > > > > > > NEED_UNWRAP status = OK > > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25 > > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25 > > > > > > > handshakestatus = > > > > > > > FINISHED status = OK > > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25 > > > > > > > 1210272744752 sslhandler unwrap0 503sessionid = 25 > > > > > > > handshakestatus = > > > > > > > NOT_HANDSHAKING status = BUFFER_UNDERFLOW > > > > > > > > > > > > > > 1210272744752 sslfilter mr 503sessionid = 25 > > > > > > > 1210272744752 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > FINISHED handshakeComplete = false > > > > > > > 1210272744752 sslhandler handshake 503sessionid = 25 > > > > > > > handshakeStatus = > > > > > > > FINISHED handshakeComplete = true > > > > > > > > > > > > > > > > > > > > > Regards, > > > > > > > Jana > > > > > > > > > > > > > > On Fri, May 9, 2008 at 2:02 PM, Kyle Sampson < > > > > > > > [EMAIL PROTECTED]> > > > > > > > wrote: > > > > > > > > > > > > > > It does seem to happen in 1.1.7 as well. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > On May 9, 2008, at 1:50 PM, Emmanuel Lecharny wrote: > > > > > > > > > > > > > > > > Hi, Kyle, > > > > > > > > > > > > > > > > > > > > > > > > > can you check with the latest releae, 1.1.7 ? > > > > > > > > > > > > > > > > > > Thanks ! > > > > > > > > > > > > > > > > > > Kyle Sampson wrote: > > > > > > > > > > > > > > > > > > I'm using MINA 1.1.3. I added SSLFilter to both the > > > > > > > > > client and > > > > > > > > > > > > > > > > > > > server > > > > > > > > > > in my application, and it seems to hang at some point > > > > > > > > > > while > > > > > > > > > > negotiating an > > > > > > > > > > SSL connection. I found a relevant JIRA issue: > > > > > > > > > > https://issues.apache.org/jira/browse/DIRMINA-390. This > > > > > > > > > > seems to > > > > > > > > > > have > > > > > > > > > > been fixed in version 1.1.1. I tried using the > > > > > > > > > > mina-filter-ssl-1.1.1.jar in place of the 1.1.3 version, > > > > > > > > > > and it > > > > > > > > > > works > > > > > > > > > > perfectly. So it seems like whatever change was made to > > > > > > > > > > fix this > > > > > > > > > > bug was > > > > > > > > > > reverted in a later version. > > > > > > > > > > > > > > > > > > > > Has anyone else had similar problems? This seems to > > > > > > > > > > happen only > > > > > > > > > > when you > > > > > > > > > > use SSLFilter along with ProtocolCodecFilter. This may > > > > > > > > > > affect only > > > > > > > > > > the > > > > > > > > > > 1.1.x branch, I'm not sure. > > > > > > > > > > > > > > > > > > > > Kyle Sampson > > > > > > > > > > [EMAIL PROTECTED] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > > > > > -- > > > > > > > > > cordialement, regards, > > > > > > > > > Emmanuel Lécharny > > > > > > > > > www.iktek.com > > > > > > > > > directory.apache.org > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Kyle Sampson > > > > > > > > > > > > > > > > > [EMAIL PROTECTED] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > > > www.vshareride.com > > > > > > > www.pragmaticinvesting.com > > > > > > > www.younag.com > > > > > > > > > > > > > > > > > > > > Kyle Sampson > > > > > > [EMAIL PROTECTED] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > www.vshareride.com > > > > > www.pragmaticinvesting.com > > > > > www.younag.com > > > > > > > > > > > > > > > > > > > > > > -- > > > > www.vshareride.com > > > > www.pragmaticinvesting.com > > > > www.younag.com > > > > > > > > > > > > > > > > > -- > > > www.vshareride.com > > > www.pragmaticinvesting.com > > > www.younag.com > > > > > > > > > > > > -- > > www.vshareride.com > > www.pragmaticinvesting.com > > www.younag.com > > > > Kyle Sampson > [EMAIL PROTECTED] > > > > -- www.vshareride.com www.pragmaticinvesting.com www.younag.com
