[rfc][icedtea-web] https probing

Jacob Wisor gitne at gmx.de
Thu Aug 7 19:37:49 UTC 2014


On 08/07/2014 07:25 PM, Jiri Vanek wrote:
> Hi!
>
> this patch *should* solve most of the issues ITW have with various broken or old
> https servers. Should, because I have no page where to reproduce. My only
> tracker is https://bugzilla.redhat.com/show_bug.cgi?id=1089130 and small
> attached program which I wrote used to tests various requests to known broken
> https server (to get files).

Err, I am having trouble understanding the reasoning behind this. Only because a 
bunch of obscure broken HTTPS servers that violate the protocol host some 
possibly even more obscure applications IcedTea-Web should weaken its SSL 
handshake protocol? :-o This gives me the creeps and sounds right silly. If this 
is the case, then I am absolutely _AGAINST_ this patch.

If IcedTea-Web is unable to properly interoprate with broken HTTPS servers then 
those servers should get updated, patched, fixed, what ever. If somebody, 
despite knowing better and against all common sense /wants/ to interoperate with 
IcedTea-Web on broken HTTPS servers, and they require a change to IcedTea-Web to 
make it work, then they should probably save this patch for themselves instead 
of deteriorating the quality of IcedTea-Web for everybody else. Or, thus perhaps 
endangering others by configuring to insecure settings.

Nevertheless, I have commented on some of the obvious stuff.

> The patch do following:
>
> Wrap all url.openconnections and connection.dieconet by wrapper.
>
> This wrapper do following:
> if connection is not not https, it acts as before (except only synchronized
> disconnect)
> if it is https, it locks other (https) connections and  tryes server:
>   -  if it is not using old handsake or invalid certificate
>   - save those settings
>   - all other https connections then uses those settings (unless overwritten)
>   - except https openconnection and all disconnect connection  all connectins
> are parallel  as we were used to (unless overwritten)
>   - the probing connection is reused (if successful)
>
>
> The default schema is not working in (rare) cases when resources are in
> differently "broken" https servers. To control this flaws there are 4
> properties, which deserves 4 checkboxes in itw-setting (another patch onc ethis
> is agreed)
>
> +    public static final String KEY_HTTPS_PROBINGALOWED =
> "deployment.security.https.proobingalowed";
>
> By default true, probing is allowed.  If set to false, then itw will behave as
> before, except synchronized disconnect

Ah, check spelling please ;-)
KEY_HTTPS_PROBINGALLOWED = "deployment.security.https.probingallowed"

Btw, the property name should probably be split into another namespace, like 
this: deployment.security.https.probing.allowed

>
> +    public static final String KEY_HTTPS_SYNCFORCED =
> "deployment.security.https.syncforced";
>
> by default false. Once true this will disable our excelent paralelism for https
> downloads. Have sense only with  probe always

The property namespace naming should probably consistent to above:

deployment.security.https.probing.syncforced

> +    public static final String KEY_HTTPS_PROBEALWAYS =
> "deployment.security.https.probealways";
 >
> when this is true,  each connection will do its own probing. So each can have
> different https settings. Have sense moreover onl with syncforced, otherwise
> exisitng conections will overwite each other and fail.

Property namespace naming:

deployment.security.https.probing.always

> +    public static final String KEY_HTTPS_ALOWUNSECURE =
> "deployment.security.https.allowunsecure";
>
> This is actually creating security hole. SO by default false. Once in
> itw-settings, it will need strong warning for user. It disables certificate
> verification.

Property namespace naming:

KEY_HTTPS_INSECUREALLOWED = "deployment.security.https.probing.insecureallowed"


> hmm..During writing of this email I have realized that I can use same
> synchronized trick as for open connection (synchronize once https is recognized,
> but let http be). The patch is updated. But I have not tested. I guess I will
> test it during next iteration. This is justnote for reviwer that if you will
> encounter any flaw in above description, this is probably cause. And so above
> "synchronize ddisconnect" is now valod only for https.

I am also and perhaps foremost against this patch because it promotes broken 
systems and/or software. It sends out the kind of message that it is okay to 
keep on running broken insecure outdated systems instead of actually promoting 
"update for security" kind of message. This bad, really bad...

Jacob



More information about the distro-pkg-dev mailing list