Review Request of JDK Enhancement Proposal: DTLS

Matthew Hall mhall at mhcomputing.net
Sat Mar 22 16:39:08 UTC 2014


Sorry about the hiccup. Supposedly the bug will work if you get in with user guest PW guest.

As for non Windows, I don't know a lot of Windows programmers, only malware analysts. So we'd need to ask somebody in Sun's porting group I think. Or if somebody has a contact at Microsoft.

Matthew.
-- 
Sent from my mobile device.

On March 22, 2014 8:30:28 AM PDT, christos at zoulas.com wrote:
>On Mar 21, 11:48pm, mhall at mhcomputing.net (Matthew Hall) wrote:
>-- Subject: Re: Review Request of JDK Enhancement Proposal: DTLS
>
>| The following bug and source code [1] are present in OpenSSL:
>| 
>| http://rt.openssl.org/Ticket/Display.html?id=1929
>
>This link is not public. Can you post a summary?
>
>| I think something similar could be done in the JDK, by making some
>tweaks to 
>| the SocketOptions classes to expose some more options. I'm pretty
>sure 
>| something relating to this will work in POSIX JDK for Linux, Solaris,
>OS X, 
>| but not sure what different magic would be needed for Windows.
>| 
>| Then there could be some kind of way to generate the right discovery 
>| datagrams, figure out the result, and feed it to the DTLSEngine for 
>| packetization purposes.
>| 
>| Also, there is some DTLS capability in Bouncy Castle, we could see
>what they 
>| allow in terms of packetization as well, though I doubt they'll have
>what 
>| OpenSSL has, since IP_MTU_DISCOVER is probably not available to them
>either.
>| 
>| I am glad you guys are working on this... I already have some use
>cases in 
>| mind for it! :-D
>
>So what happens on !linux?
>
>christos




More information about the security-dev mailing list