RFR: JDK-8210846, TLSv.1.3 interop problems with OpenSSL 1.1.1 when used on the client side with mutual auth

Jamil Nimeh jamil.j.nimeh at oracle.com
Wed Sep 19 22:21:03 UTC 2018


I will add my test information to the bug.  Thanks for reviewing it.


--Jamil
-------- Original message --------From: Bradford Wetmore <bradford.wetmore at oracle.com> Date: 9/19/18  3:13 PM  (GMT-08:00) To: Norman Maurer <norman.maurer at googlemail.com>, Jamil Nimeh <jamil.j.nimeh at oracle.com> Cc: OpenJDK Dev list <security-dev at openjdk.java.net> Subject: Re: RFR: JDK-8210846, TLSv.1.3 interop problems with OpenSSL 1.1.1 when used on the client side with mutual auth 
Looks good from a CR standpoint.  Silly typos...

Looking forward to hearing back from Norman.  I believe we are running 
the same testbed, so I expect it will work.

Jamil, be sure to include the specific interop test information in the 
bug, so that when SQE goes to verify, they can be sure to run it manually.

Brad


On 9/19/2018 1:59 PM, Norman Maurer wrote:
> I will test and report back later today . Thanks for the quick turnaround
> 
>> Am 19.09.2018 um 13:47 schrieb Jamil Nimeh <jamil.j.nimeh at oracle.com>:
>>
>> Hello all,
>>
>> This fix handles an issue in TLS client certificate authentication where our client was failing to send a certificate after consuming the CertificateRequest message.  Thanks to Norman Maurer for bringing this to our attention.
>>
>> Webrev: http://cr.openjdk.java.net/~jnimeh/reviews/8210846/webrev.01/
>>
>> JBS: https://bugs.openjdk.java.net/browse/JDK-8210846
>>
>> --Jamil
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.openjdk.org/pipermail/security-dev/attachments/20180919/af0c4b73/attachment.htm>


More information about the security-dev mailing list