RFR: JDK-8210846, TLSv.1.3 interop problems with OpenSSL 1.1.1 when used on the client side with mutual auth

Norman Maurer norman.maurer at googlemail.com
Wed Sep 19 23:32:03 UTC 2018


I can confirm that this patch fixes the issue I was seeing. After applying it it also passes all of the tests that we have in the SSL testsuite of netty.

So +1 from me.

Bye
Norman


> On 19. Sep 2018, at 15:13, Bradford Wetmore <bradford.wetmore at oracle.com> wrote:
> 
> Looks good from a CR standpoint.  Silly typos...
> 
> Looking forward to hearing back from Norman.  I believe we are running the same testbed, so I expect it will work.
> 
> Jamil, be sure to include the specific interop test information in the bug, so that when SQE goes to verify, they can be sure to run it manually.
> 
> Brad
> 
> 
> On 9/19/2018 1:59 PM, Norman Maurer wrote:
>> I will test and report back later today . Thanks for the quick turnaround
>>> Am 19.09.2018 um 13:47 schrieb Jamil Nimeh <jamil.j.nimeh at oracle.com>:
>>> 
>>> Hello all,
>>> 
>>> This fix handles an issue in TLS client certificate authentication where our client was failing to send a certificate after consuming the CertificateRequest message.  Thanks to Norman Maurer for bringing this to our attention.
>>> 
>>> Webrev: http://cr.openjdk.java.net/~jnimeh/reviews/8210846/webrev.01/
>>> 
>>> JBS: https://bugs.openjdk.java.net/browse/JDK-8210846
>>> 
>>> --Jamil
>>> 




More information about the security-dev mailing list