RFR 8222805: sun/security/pkcs11/tls/tls12/TestTLS12.java fails with Unsupported signature algorithm: rsa_pss_rsae_sha256

Sean Mullan sean.mullan at oracle.com
Wed Apr 24 17:34:16 UTC 2019


On 4/24/19 10:38 AM, Martin Balao wrote:
> Hi Sean,
> 
> On 4/24/19 7:12 AM, Sean Mullan wrote:
>>
>> I am still concerned about the odd workaround for this issue. Can you
>> comment on my previous comment that I raised?:
>>
>> On 4/23/19 4:33 PM, Sean Mullan wrote:> However, I think there may be a
>> more subtle bug or configuration issue
>>> underlying this. It seems like this could come up in real scenarios. You
>>> should never disable a strong algorithm, even if it is unsupported, in
>>> order to establish a TLS session. It should be able to negotiate a
>>> session using a different algorithm.
>>>
> 
> The reason why we disable the algorithm in the test is related to [1].
> What happens is that we need to have SunPKCS11, SUN and JSSE crypto
> providers enabled for a successful TLS communication in FIPS mode. The
> reason we need SUN -which looks as the odd one out there- are X.509
> certificates. However, having SUN enabled (after JSSE experimental FIPS
> changes) means that we support "RSAPSS" for the TLS communication. When
> this algorithm is applied by SUN provider to a SunPKCS11-sensitive key
> (keys are sensitive in FIPS mode and cannot be converted), it fails. As
> I said in [1], we need a good solution beyond the workaround of
> disabling concrete algorithms. I'd be happy to update the test when this
> is fixed.

Ok, thanks for that link. We need to file another bug to track the 
underlying issue then as I don't see anything filed. It seems quite 
likely that this could come up in a real scenario and telling a customer 
to disable RSA-PSS is just not right in my opinion.

Can you please file a bug for that and link it to this test bug? I'm ok 
with you pushing this test workaround fix for now since we need to get 
this resolved soon. I also agree with Xuelei that it would be helpful to 
add more comments in the test as to why the security property workaround 
is needed.

Thanks,
Sean

> 
> Kind regards,
> Martin.-
> 
> --
> [1] -
> https://mail.openjdk.java.net/pipermail/security-dev/2019-March/019469.html
> 



More information about the security-dev mailing list