[rfc][icedtea-web] https probing
Jacob Wisor
gitne at gmx.de
Wed Sep 24 14:41:02 UTC 2014
On 09/23/2014 at 05:31 PM, Jiri Vanek wrote:
> On 09/14/2014 06:17 AM, Jacob Wisor wrote:
>> On 09/10/2014 at 11:42 AM, Jiri Vanek wrote:
Because the discussion on this patch has become quite extensive I am going to
focus on the two most important issues only. At least for now.
[...]
>>> + if (url.getProtocol().equalsIgnoreCase("https") &&
>>> isProbingAllowed()) {
>>> + if (isSyncForced()) {
>>> + while (!httpsConnections.isEmpty()) {
>>> + try {
>>> + Thread.sleep(100);
>>> + } catch (InterruptedException ex) {
>>> + throw new IOException(ex);
>>> + }
>>> + }
>>
>> Polling? Really? Is this really the proper way to do it? And, do we really
>> need to offer
>
>
> Actually yes. I dont know about better way here. I will be happy if you have some.
>
> What I wonted to take care about, is situatuion when the individual https
> settings differe. Then the first one must be disconnected, before second can
> apply for new settings.
> And so tehre is need to not accept other https conenctions until previous one
> disconnects.
>
>
>> synchronous connections?
>> Besides, what about infinite looping?
>
> Do you mean that it can deadlock here? Yes. I'm thinking the same. But The same
> deadlock will rise now too. For my pooling here, the timeout is most simple
> solution and will probably appear in some next iteration changeset
I think you cannot avoid to pay tribute to the fact that networks are inherently
asynchronous by their very nature (I am not talking about USB here ;-) ). Having
said that, we /can/ support synchronous connection creating but it should be
based on asynchronous calls because ... you guessed it, of a network's inherent
asynchronous nature.
Anyway, the Http(s)Factory should support creating HTTP /and/ HTTPS connections
(and thus download JNLP resources) not only asynchronously but also
concurrently. None of the protocols posses a property that prevents us from
implementing asynchronous connection creating, forces us to support synchronous
connection creating only (even when testing for multiple versions), nor imposes
a limit on the full (logical) potential of a network. Besides, establishing
connections synchronously only, is definitely not the state of the art for the
21st century. ;-)
Also, please note that your current approach is not thread-safe, even for
synchronous calls only! Thread-safety is actually a MUST for a Http(s)Factory.
Simply putting the synchronized keyword in front of a method declaration is not
fully solving the problem here nor should actually be done this way. What you
actually want to synchronize is the access to the Http(s)Factory's internal
state, not the access to the factory (its methods) itself. There is no need to
block *all* other threads which want to create a connection just because one
thread is using the factory or is waiting for the factory to complete creating a
connection for it. I strongly advise you to rewrite the factory accordingly.
The proper way to provide a synchronous call in an asynchronous environment is
to block or yield. And, you certainly do not accomplish this with potentially
infinite loops making the current thread wait an arbitrary amount of time. What
you do is; you set off the asynchronous call and then wait (Object.wait()) until
you get notified (Object.notify()) by the asynchronous call's on complete method.
>>> [...]
>>> + //this s intentional search by object value. equals do not work
>>> + for (int i = 0; i < httpsConnections.size(); i++) {
>>
>> Start from the end, decrement to 0, and compare to 0. Comparing to 0 gives
>> almost always far better
>> performance on modern processors because they are heavily optimized for branch
>> prediction on 0.
>>
>>> + URLConnection uRLConnection = httpsConnections.get(i);
>>> + if (uRLConnection == conn) {
>>> + httpsConnections.remove(i);
>>> + i--;
>>
>> Besides, why not use ArrayList.removeAll(Collection) here? It is probably much
>> faster, even though
>> you have to create a Collection instance.
>
>
> I'm not sure what you mean here.
You are trying to remove all "conn" elements from the "httpsConnections"
ArrayList the awkward way. The best way to do this is to call
ArrayList.removeAll(Collection) instead of iterating through the ArrayList manually.
>>> [...]
>>> + public static URLConnection openConnection(URL url, boolean ssl2,
>>> boolean insecure)
>>> throws IOException {
>>> + try {
>>> + if (ssl2) {
>>> + System.setProperty("https.protocols", "SSLv3,SSLv2Hello");
>>> + } else {
>>> + System.clearProperty("https.protocols");
>>> +
>>> + }
>>
>> I am absolutely sure we do not want to modify *system* properties for *all*
>> future connections here.
>> What about other existing and other future connections, especially connections
>> created by a JNLP
>> application?
>> And then there are SecurityManager implications. What if these or all system
>> properties are read-only?
>> So no, we do not want to modify system properties at runtime.
>
> Ok.I made investigations and you are right. This is show stopper on current
> approach.
> The issue helpcrypto is facing with jdk8 have solution based on properties to:(
This raises the question whether we should bother about this at all, since the
SSL version of HTTPS connections can and have always been configurable by system
properties in the JRE. :-D
> By default, no probing will be done, and itw will work as before.
> There will be only one property - public static final String
> KEY_HTTPS_PROBINGALLOWED = "deployment.security.https.probing.allowed";
Then this property should be renamed to "deployment.security.https.probing.enabled".
> By default false, and with possible true/false
>
> Maybe probing will be possible to turn on in runtime, if https connection fails,
> on users approve.
It could. But, on the other hand who or what would turn on probing for HTTPS
connections at runtime? The JNLP application? Certainly not. A JNLP application
does not even control downloading resources directly.
Then perhaps the user? If so, this would require for the user to be able to
change the desired JNLP application's JRE configuration in some kind of UI or
command line interface provided by IcedTea-Web. And it would make tracing the
configuration for every running JNLP application and visualizing system
properties mandatory. This is counter intuitive and breaks JNLPRuntime's current
concept which is to configure the JRE for a JNLP application's entire lifetime.
Besides, there is currently no UI or infrastructure to support this in IcedTea-Web.
> Once proobing is true, then the scenario will be same as attached (same as
> always in this thread) chnageset with :
> deployment.security.https.syncforced = true
Why so? Why should creating HTTPS connections be synchronous only? There is no
rational reason to impose such a limit. Besides, it definitely leads to
increased latencies and possibly to decreased throughput.
> deployment.security.https.probing.always = true
> deployment.security.https.allowinsecure = ask
Jacob
More information about the distro-pkg-dev
mailing list