Jjeps 8046321

2015-04-06 Thread Thomas Lußnig
Hi, is there anyone working on OCSP-Stapling ? I patched my java version to get it running for server side. Maybe i can help with some parts of the implementation. Gruß Thomas

Re: [9] RFR: 8076117: EndEntityChecker should not process custom extensions after PKIX validation

2015-04-13 Thread Thomas Lußnig
Hi, even if i am new in this list i looked at the solution and have an question. Why there is an switch to turn off check for unknown critical extensions ? >From my point of view as an developer i would say an more secure solution would be instead of an boolean switch, make an Set checkedOids as n

Re: JEP 244: TLS Application-Layer Protocol Negotiation Extension

2015-04-13 Thread Thomas Lußnig
h such an extension options it would be much more simple do implement new Extensions. Gruß Thomas Lußnig

Re: JEP 244: TLS Application-Layer Protocol Negotiation Extension

2015-04-13 Thread Thomas Lußnig
Hi, this could be an interface for such an Callback. It allow hello extensions as well as handshake extensions. If it would be really clean we would have an handler for: - NPN - ALPN - Channel ID - ZertificateSignature - OCSP-Stapling - ServerName - Session Ticket The handler could be also used f

Re: JEP 244: TLS Application-Layer Protocol Negotiation Extension

2015-04-13 Thread Thomas Lußnig
Hi, i checked the CipherSuites in JDK and found that in the JDK there is and mistake i think. In CipherSuite the method add set the PRF to NONE only if obsoleted less than TLSv1.2. But if the suite is forbidden / obsoleted in TLSv1.2 the check must be <= (less or equal) if i am correct. http://gr

Re: [9] RFR: 8076117: EndEntityChecker should not process custom extensions after PKIX validation

2015-04-13 Thread Thomas Lußnig
Hi, even if i am new in this list i looked at the solution and have an question. Why there is an switch to turn off check for unknown critical extensions ? >From my point of view as an developer i would say an more secure solution would be instead of an boolean switch, make an Set checkedOids as n

Re: JEP 244: TLS Application-Layer Protocol Negotiation Extension

2015-04-13 Thread Thomas Lußnig
h such an extension options it would be much more simple do implement new Extensions. Gruß Thomas Lußnig

Re: JEP 244: TLS Application-Layer Protocol Negotiation Extension

2015-04-14 Thread Thomas Lußnig
s for extension parameters any more. > > JSSE is open source and an provider based framework. Alternatively, > we'd like to accept extension implementation contributions, or developer > can define their own private provider if necessary. > > Regards, > Xuelei > > On 4

Re: JEP 244: TLS Application-Layer Protocol Negotiation Extension

2015-04-14 Thread Thomas Lußnig
oes not set the PRF to the invalid NONE as i would expected with the description. Gruß Thomas > On 4/14/2015 2:25 AM, Thomas Lußnig wrote: >> Hi, >> >> i checked the CipherSuites in JDK and found that in the JDK there is and >> mistake i think. >> In CipherSuite the

Re: [9] RFC: 8061798: Add support for TLS_FALLBACK_SCSV (RFC 7507)

2015-05-06 Thread Thomas Lußnig
Hi, i looked at the patch files looks OK for me too. Since i also implemented it i can tel the server part ist ok. Once think i found maybe an optimisation: instead of mesg.protocolVersion.compareTo(getActiveProtocols().max) < 0 maybe use mesg.protocolVersion.v < getActiveProtocols().max.v in

Re: JEP 244: TLS Application-Layer Protocol Negotiation Extension

2015-05-20 Thread Thomas Lußnig
Hi, 1) There are two types of extensions: a) That modify the directly how the engine works like [max_fragment_length,heartbeat,encrypt_then_mac,extended_master_secret,SessionTicket,...] b) That provide information (modify the network protocol) like [npn,alpn,status_request,...] 2) Some of the exti

Re: [8u] request for review: 8062552 Support keystore type detection for JKS and PKCS12 keystores

2015-05-21 Thread Thomas Lußnig
Hi, most of it look ok for me, but in "http://cr.openjdk.java.net/~vinnie/8062552/webrev.01/src/share/classes/sun/security/util/KeyStoreDelegator.java.patch"; i found in the method engineLoad the exception handling an bit ugly. +} catch (Exception e) { + +// in

Re: [8u] request for review: 8062552 Support keystore type detection for JKS and PKCS12 keystores

2015-05-23 Thread Thomas Lußnig
Hi, 1) Would it not be an good idea to check the first bytes of the message so that the dual class already know what type the stream is and there is no unnecessary instanciation of exceptions and engine class? 2) If we add an "smart" keystore why we limit it to two types? I do not see any reason w

Re: [8u] request for review: 8062552 Support keystore type detection for JKS and PKCS12 keystores

2015-05-23 Thread Thomas Lußnig
backport/use it ? Why build this limited version for one single usecase instead of using the more gerneral solution ? > >> On 23 May 2015, at 09:42, Thomas Lußnig wrote: >> >> Hi, >> >> 1) Would it not be an good idea to check the first bytes of the message >>

Re: RFR: 8072692: Improve performance of SecurityManager.checkPackageAccess

2015-06-16 Thread Thomas Lußnig
Hi, two points that come directly to my mind when i checked the code: 1) An Error in the description. +// If plast >= plen then restrictedPkg is longer than pkg by at +// least one char. This means pkg cannot start with restrictedPkg, +// since restrictedPkg w

Re: RFR: JEP 249 (OCSP Stapling for TLS)

2015-06-21 Thread Thomas Lußnig
Hi, here are some comments about what i was thinking: http://cr.openjdk.java.net/~jnimeh/reviews/8046321/webrev.0/src/java.base/share/classes/javax/net/ssl/ExtendedSSLSession.java.patch - Why not make the parsed message available ? If the client wan't to check it he need to parse/implement the

Re: RFR: 8060103: CheckBlacklistedCerts.java thinks its openjdk build

2015-06-21 Thread Thomas Lußnig
Hi, we are talking about security. So is there any reason why the OpenJDK should include not the same Blacklisted Certificates as in other Jdk Versions? Or with other words does it make sense to do other blacklist tests in openjdk at all ? Gruß Thomas On 18.06.2015 01:00, Rajan Halade wrote: > M

Re: RFR: JEP 249 (OCSP Stapling for TLS)

2015-06-21 Thread Thomas Lußnig
On 21.06.2015 17:56, Jamil Nimeh wrote: > > The X509TrustManager, if configured to do revocation checking at all, > should handle the checks so the client doesn't have to. Can you tell > me a little more about what environment a customer would want to > re-check the responses above and beyond what

Possible DOS in KeepAliveCache

2015-07-06 Thread Thomas Lußnig
in state close_wait? - Maybe check if we can read one byte (nonBlocking) because we are not expecting data on idle connection. Gruß Thomas Lußnig p.s. My workaround public void run() { do { try { Thread.sleep(LIFETIME); } catch (final InterruptedException e) {} sy

Re: Hashing in Java and Java Cryptography Architecture (JCA) design

2018-10-23 Thread Thomas Lußnig
Hi, even if it looks complicated for you the idea is that your code is not hard wired to MD5 or SHA1 but in ideal case it is configured. Than you do not know in advance if the selected digest is available. On the other hand no one say that you can create your own helper/tools class. The idea i

JDK11 Bug with SSLv3

2018-12-10 Thread Thomas Lußnig
the debug log. If there is no bug opened yet i can provide an sample with client/server that demonstrate the bug and can maybe used for regression tests. Gruß Thomas Lußnig 2018-12-10T12:16:41.666 javax.net.ssl|DEBUG|15|https://fqdn/path)|2018-12-10 12:16:41.666 CET|ClientHello.java:65

Re: JDK11 Bug with SSLv3

2018-12-10 Thread Thomas Lußnig
that the jdk as server does not check if the received messages matches the selected protocol version.     -> I think this does not open an security issue but should be verified too, it maybe wanted for compatibility but than it should be configurable per connection. Gruß Thomas Lußnig pack

Re: Not possible to disable new TLS extensions for TLS 1.2 connections

2019-02-13 Thread Thomas Lußnig
Hi, maybe two points. 1) Older lotus notes server have the problem. 2) The problem can be solved if you disable TLSv1.3 or even TLSv1.2 3) Maybe it would be an good idea to build an set of client hello's with different options. Or even an generator. Than you send if and check the result si

Re: Not possible to disable new TLS extensions for TLS 1.2 connections

2019-02-13 Thread Thomas Lußnig
send 65535 as EC group that was causing the trouble. Am 13.02.2019 um 23:08:22 schrieb Amir Khassaia: Hi Thomas, Can you confirm its tied to new extensions to TLS 1.2 client hello and whether you diagnosed which one was the problem in Lotus Notes case ? On Thu, Feb 14, 2019 at 9:05 AM Thomas

Problems with CipherBox and AEAD

2015-10-12 Thread Thomas Lußnig
, 8, 8, true );" Then in createExplicitNonce the nonce should become zero size but is fixed length for AEAD of 8 bytes. Both was seen in JDK-1.8.0_60 Gruß Thomas Lußnig

Re: Problems with CipherBox and AEAD

2015-10-14 Thread Thomas Lußnig
ed as IETF RFC? Looks like the proposal was not moving forward since May, 2014. https://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-04 Thanks, Xuelei On 10/11/2015 3:59 PM, Thomas Lußnig wrote: Hi, when i extends "sun.security.ssl.CipherSuite" with final static BulkCipher

Re: Issue when connecting to TLSv1 server

2016-02-05 Thread Thomas Lußnig
Hi, i checked the server with https://dev.ssllabs.com/ssltest/analyze.html?d=nfe-homologacao.sefazrs.rs.gov.br the result is more than bad. I think you should use SSL Context and define what cipher/protocol you allow and check the security.property that there is no restriction on key length.

Re: Issues with ALPN implementation in JDK 9

2016-06-14 Thread Thomas Lußnig
Hi, i think not only the cipher suite and protocol version. But many other parts should be also be public. Like Supported digest, curve types, etc... And also these information should be available for the keymanger. So that he is able to select certificate also based on the curve types. Gruß T

RandomCookie problem ?

2016-12-13 Thread Thomas Lußnig
Hi, even if the case is with the current time not active. Is it an good idea to define an fixed value for random generator under special conditions that are time depending ? Gruß Thomas --- package sun.security.ssl; RandomCookie(final SecureRandom sr) { final long ts0 = System.c

Re: JDK-8016345 (DNSName does not accept names with leading numbers) will-not-fix? Why?

2017-03-31 Thread Thomas Lußnig
Hi, both errors have in common that there are about an change of allowed hostnames. But as for the second bug there is an big mistake. The underscore is allowed for SRV and CNAME but not for A records. For SRV records it is wide used in LDAP records for MS Domain System (PDC). But the Subject

Re: Tls 1.2 support info

2017-11-30 Thread Thomas Lußnig
Hi, maybe you could tell more what you need to know about TLS 1.2 support? Do you wan't an general overview of features (Stappling, SC, ...) or are you are you interested in the available cipher suites. If you are so general the simple answer is that TLS 1.2 is supported as client and server on

Howto extend JDK9 TLS-CipherSuites

2018-01-02 Thread Thomas Lußnig
Hi, with JDK 8 it was Possible to extend the List of Available CipherSuites by modify the sun.security.ssl.CipherSuite. With JDK9 and the module system this is not any more possible with an bootclasspath, is there any other way to do it? Disable module check or something ? Gruß Thomas

Re: JEP 329: ChaCha20 and Poly1305 Cryptographic Algorithms

2018-03-22 Thread Thomas Lußnig
Hi, is there any reason that the cipher and and the tls inclusion is split into two separate jep? And the second question is why is there no way for user to add new cipher suites that can be used in the tls protocol? Since i extend jdk8 with chacha for tls i know that it would be no big issue

Re: RFR: ChaCha20 and ChaCha20/Poly1305 Cipher implementations

2018-03-26 Thread Thomas Lußnig
Hi Jamil, 1) where there any guidelines about how the engineToString should be formatted ? I ask because i wondering why we need two new lines with access to the System property. If it is represented as single line json no need to line break would be needed. Gruß Thomas /** * Creates a for

Re: RFR: ChaCha20 and ChaCha20/Poly1305 Cipher implementations

2018-03-26 Thread Thomas Lußnig
Hi, this choice is even better than the current version. Because than the default system wide secure random provider is used. Gruß Thomas On 3/27/2018 12:23 AM, Jamil Nimeh wrote: Another thought on #2: Another way we could go with this is to create a new SecureRandom() or use JceSecurity.

Re: RFR: ChaCha20 and ChaCha20/Poly1305 Cipher implementations

2018-04-11 Thread Thomas Lußnig
Hi, i found another point. The "key" field can be removed from ChaCha20Cipher. 1) This field is only set once and later checked if it was initialized. But we do not want to knew is the key exists but if key bytes exists. 2) So if two lines are changed from key to keyBytes we can remove this

Re: RFR: ChaCha20 and ChaCha20/Poly1305 Cipher implementations

2018-04-11 Thread Thomas Lußnig
dless of what the caller sets there?).  Using IvParameterSpec with ChaCha20-Poly1305 is more clear because it only allows the caller what they need to get CC20/P1305 going, the nonce.  Respectfully, I would like to keep this as-is. --Jamil On 3/26/2018 12:45 PM, Thomas Lußnig wrote:

Re: RFR: ChaCha20 and ChaCha20/Poly1305 Cipher implementations

2018-04-11 Thread Thomas Lußnig
Hi, same with key/keyBytes is with the class Poly1305 also here the key is not used. Gruß Thomas On 4/11/2018 5:54 PM, Jamil Nimeh wrote: Yes, that does appear to be the case, good catch!  I'll make that change. --Jamil On 4/11/2018 7:18 AM, Thomas Lußnig wrote: Hi, i found an

Bug in HttpClient

2018-07-19 Thread Thomas Lußnig
example that show the problem.* * Gruß Thomas Lußnig * *import*java.io.InputStream; *import*java.io.OutputStream; *import*java.net.InetSocketAddress;* import*java.net.ServerSocket;* import*java.net.Socket;* import*java.net.URI;* import*java.time.Duration;* import*javax.net.ServerSocketFactory

NPE in SupportedGroupsExtension

2018-08-23 Thread Thomas Lußnig
Hi, i got these NPE on my Server. With Java: openjdk 11-ea 2018-09-25 OpenJDK Runtime Environment 18.9 (build 11-ea+25) OpenJDK 64-Bit Server VM 18.9 (build 11-ea+25, mixed mode) java.lang.NullPointerException     at java.base/sun.security.ssl.SupportedGroupsExtension$SupportedGroups.getEC

Re: NPE in SupportedGroupsExtension

2018-08-23 Thread Thomas Lußnig
24.08.2018 00:00:41, Jamil Nimeh wrote: Hi Thomas, can you reproduce the issue with debug logging turned on? It may be helpful in conjunction with the stack trace you've provided.  You should be able to turn it on with -Djavax.net.debug=ssl Thanks, --Jamil On 8/23/2018 2:41 PM, Thomas Lußnig

Re: NPE in SupportedGroupsExtension

2018-09-09 Thread Thomas Lußnig
ange_modes extension". If there is an PSK without an matching extension this should not kill the connection i think. Nearly all other server accept this. Gruß Thomas Lußnig javax.net.ssl.SSLHandshakeException: pre_shared_key key extension is offered without a psk_key_exchange_mode

Re: Code Review Request, JDK-8209916 : NPE in SupportedGroupsExtension

2018-09-12 Thread Thomas Lußnig
Hi, does the fix work if there is only one unknown named group ? Not that the connection fails than with an better error text instead of skiping the unknown group. Gruß Thomas On 12.09.2018 04:22:49, Xuelei Fan wrote: Hi Jamil, Would you please review the fix for the NPE issue:    http://cr

Re: RFR: 8267844: Replace Integer/Long.valueOf() with Integer/Long.parse*() where applicable

2021-08-10 Thread Thomas Lußnig
place is changed and the performance of parse is improved wihtout change it. Gruß Thomas Lußnig On 10.08.2021 19:43:15, Сергей Цыпанов wrote: On Tue, 10 Aug 2021 14:56:11 GMT, Claes Redestad wrote: The code in `Integer.decode()` and `Long.decode()` might allocate two instances of Integer/Long