[ 
https://issues.apache.org/jira/browse/DERBY-2356?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12474990
 ] 

John H. Embretsen commented on DERBY-2356:
------------------------------------------

A few comments after my first take at trying out the (v1) patch:

(I have only tried ssl=basic so far...)

1) No server commands (e.g. shutdown, ping, runtimeinfo) worked after the 
server was started with SSL on (basic) . The message I'm getting is:

    Invalid reply header from network server: Invalid string .

2) Using -Dderby.drda.sslMode=basic (and ssl=basic in the client URL) seemed to 
work fine, although I did not actually inspect the network traffic to verify 
encryption.

3) Using ssl=basic as an option to the NetworkServerControl start command did 
not work:

    Command line: java <properties> -jar derbyrun.jar server start ssl=basic
    Result: Invalid number of arguments for command start.

    Command line: java <properties> -jar derbyrun.jar server start -ssl=basic
    Result: Argument -ssl=basic is unknown.

  I tried both with and without the -unsecure option/plain-text authentication.

4) The funcSpec says:

     SSL at the server side is activated with the property
    derby.drda.sslMode (default off) or the -ssl option for the server
    command.

   By "the server command", do you mean the start command of the server? This 
should perhaps be clarified in the funcSpec?

5) The funcSpec also says:

    The property may have three values: "off", "basic" and
    "peerAuthentication"

   However, the example in section 2.3 is using ssl=authenticate. Also, 
comments in the patch seem to indicate that "false", "true" and "auth" are also 
valid property values. What is (or should be) the correct set of valid values?

6) I verified that connection attempts against a server started with SSL off, 
but with ssl=basic in the client URL, resulted in an informative error message 
on the client side.



> Make SSL server authentication optional
> ---------------------------------------
>
>                 Key: DERBY-2356
>                 URL: https://issues.apache.org/jira/browse/DERBY-2356
>             Project: Derby
>          Issue Type: Improvement
>          Components: Network Client, Network Server
>    Affects Versions: 10.3.0.0
>            Reporter: Bernt M. Johnsen
>         Assigned To: Bernt M. Johnsen
>             Fix For: 10.3.0.0
>
>         Attachments: derby-2356-v1.diff, derby-2356-v1.stat, SSLFuncSpect.txt
>
>
> Default SSL behaviour is to require serer authentication. For a database 
> application this is not as important as it is for web browsers and also 
> creates som extra hassle for the user/application programmer. Since the main 
> objective for SSL in Derby is encryption on the wire, server authentication 
> should be optional (the same way client authentication is).
> This also creates some symmetry which can be exploited to simplify the user 
> interfce somewhat. This improvement to DERBY-2108 is described in the 
> attached functional specification. See the attachment for details.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to