RFR 8211018: Session Resumption without Server-Side State

Anthony Scarpino anthony.scarpino at oracle.com
Fri May 24 18:52:51 UTC 2019


On 5/24/19 8:51 AM, Xuelei Fan wrote:
> SSLSessionContext.java
> ----------------------
> As comment in the CSR review thread, I may not define the 
> jdk.tls.server.sessionTicketTimeout property, and use one session 
> timeout (SSLSessionContext.getSessionTimeout()) instead.
> 
> The ticket timeout may be not necessary, read more please.
> 
> SessionTicketExtension.java
> ---------------------------
> As comment in the CSR review thread, I may not define the key timeout. 
> Instead, I may use key usage limit.  As it is stateless server, I may 
> not use the stateless session timeout as well, for less states.  The key 
> rotation scheme might be able to take place of timeout.  For client 
> side, the session context session timeout and management may be 
> sufficient for the client side cache cleanup.

The spec says the keys need to be rotated regularly.  Of course 
"regularly" is up for interpretation.  If a usage limit is implemented 
and the server is not frequently used, it's possible to have the same 
key used for the entire span of the session timeout.  I don't feel that 
is often enough.

> 
> StatelessKey.gcmspec:
> If I read it right, the same key and iv are used for every ticket 
> encryption.  This behavior is vulnerable.  The IV should be unique for 
> each encryption.

GCM as a whole was probably the wrong choice

> 
> I would like to avoid to create thread in the fundamental API 
> implementation if possible.  As the thread (KeyState.run()) is for 
> invalid key cleanup only, the cleanup can be moved to the get methods.

How is this thread in the API?  It is only started when the key is 
generated and not by a API call and it's the internal parts of the 
implementation.

> 
> For each StatelessKey, one thread is created.  I was wondering if there 
> are any chance that there are multiple threads to manage the stateless 
> keys, and potential memory leak?

Every time a new session key.  Depending on the property the default is 
once an hour. It's possible multiple threads can be used if the timing 
is just right, but that only mean it runs through the list a few times. 
Hardly a performance issue.  Each key is put in the hashmap, so there is 
no memory leak.  Maybe I can trim it down to a static thread that runs 
when needed, that would eliminate the multiple threads, but maybe add 
more locks.

> 
> Anyway, I will try to avoid to use internal thread.  I may use a key 
> rotation scheme similar to cookie manager (use two keys, one for legacy 
> and one for the current key, see HelloCookieManager.java).

The thread is one piece for clean up, if I remove it from the thread, I 
will need to be put into the main code path.

The keys have a longer life, the defaults are 1 hour and can last up to 
24hrs.  Those can be changed with the properties in a way that would 
require more keys to be stored.  So rotating keys will involve some sort 
of Map or storage object.  HelloCookieManager just needs to remember the 
previous secret and for a short period of time as the response from the 
client could be only a few seconds.

As for the for the lock mechanism around the rotation.  I don't see much 
difference between you using the ReentrantLock vs the synchronized block 
I have.  I'm trying to minimize the amount of time in the lock 
generating the key.  I'm not so concerned about a few extra keys being 
generated.  Putting in more locks just means more chances for the main 
code path getting stopped.

I don't see the significants to this other than being personal coding 
styles.

> 
> If the key is invalid, an exception will be thrown and then fail back to 
> full handshake.  Exception thrown and catch are expensive, I may not 
> exception for the failback to full handshake.

If there is an exception the full handshake is going to be more 
expensive than the exception.  I could probably code away the exception.

> 
> Let's discuss these issues firstly before we moving on with more code 
> review.
> 
> Hope it helps.
> 
> Thanks,
> Xuelei
> 
> 
> On 5/21/2019 5:35 PM, Anthony Scarpino wrote:
>> Hi all,
>>
>> I’ve updated in-place some recent changes due to some additional testing
>>
>> Tony
>>
>>> On May 16, 2019, at 2:30 PM, Anthony Scarpino 
>>> <anthony.scarpino at oracle.com> wrote:
>>>
>>> I'm asking for a review of this rather large change to add support 
>>> stateless tickets in the TLS 1.3 5077 RFC.
>>> https://bugs.openjdk.java.net/browse/JDK-8211018
>>>
>>> http://cr.openjdk.java.net/~ascarpino/stateless/webrev.00
>>>
>>> thanks
>>>
>>> Tony
>>




More information about the security-dev mailing list