the GMT timestamp given in the trace is sometimes wrong

Xuelei Fan xuelei.fan at oracle.com
Thu Oct 31 22:55:00 UTC 2019


On 10/31/2019 3:44 PM, Bernd Eckenfels wrote:
> It would make sense to no longer calculate and print the timestamp in 
> the debug log if we don’t want it to be relied upon. This would be less 
> missleading (and mopst likely the shifting logic can be removed?)
> 
Yes.  No timestamp, only 32 bytes random number in the debug log since 
JDK 11.

Xuelei

> 
> -- 
> http://bernd.eckenfels.net
> ------------------------------------------------------------------------
> *Von:* security-dev <security-dev-bounces at openjdk.java.net> im Auftrag 
> von Xuelei Fan <xuelei.fan at oracle.com>
> *Gesendet:* Donnerstag, Oktober 31, 2019 11:10 PM
> *An:* Eugène Adell
> *Cc:* security-dev at openjdk.java.net
> *Betreff:* Re: the GMT timestamp given in the trace is sometimes wrong
> The ClientHello.random has been changed to use "random number" since TLS
> 1.3 (See RFC 8446). The 4 leading bytes are not more used to indicate
> clock in the current implementation. For more details, please consider
> this doc (https://tools.ietf.org/id/draft-mathewson-no-gmtunixtime-00.txt).
> 
> Xuelei
> 
> On 10/31/2019 2:36 PM, Eugène Adell wrote:
>  > Hello,
>  >
>  > with Java 8 and earlier (and probably some later that I didn't check),
>  > the timestamp is correct half of the time, incorrect the other half,
>  > because of the bad shifting that I pointed in my first post. One
>  > incorrect clock is not supposed to be correct 50% of the time, for
>  > example it would be 1 minute late all the time.
>  >
>  > With Java 11 the clock is always incorrect, and even it can't be
>  > considered a clock anymore when your clock is years late, it's still
>  > more consistent than the previous behaviour.
>  >
>  > "Please don't have the application rely on the gmt_unix_time value."
>  > Sure, and anyway a Java application cannot access to this value from
>  > what I know. Having a correct time is however useful when analyzing
>  > logs produced with javax.net.debug property, or correlating with a
>  > network capture. This is how I went to see that problem, by
>  > investigating an issue, and we shouldn't underestimate the very few
>  > tools that allow troubleshooting.
>  >
>  > best regards
>  > E.A.
>  >
>  >
>  > Le jeu. 31 oct. 2019 à 21:50, Xuelei Fan <xuelei.fan at oracle.com> a 
> écrit :
>  >>
>  >> Hi,
>  >>
>  >> The TLS spec does not require a correct gmt_unix_time:
>  >> [RFC 5246] "Clocks are not required to be set correctly by the
>  >> basic TLS protocol; higher-level or application protocols may
>  >> define additional requirements."
>  >>
>  >> Please don't have the application rely on the gmt_unix_time value.
>  >>
>  >> Xuelei
>  >>
>  >> On 8/11/2019 4:26 PM, Eugène Adell wrote:
>  >>> Hello,
>  >>>
>  >>> When using the well-known javax.net.debug=all property we get outputs
>  >>> similar to this :
>  >>>
>  >>> ...
>  >>> Ignoring unsupported cipher suite:
>  >>> TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 for TLSv1.1
>  >>> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
>  >>> for TLSv1.1
>  >>> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
>  >>> for TLSv1.1
>  >>> %% No cached client session
>  >>> update handshake state: client_hello[1]
>  >>> upcoming handshake states: server_hello[2]
>  >>> *** ClientHello, TLSv1.2
>  >>> RandomCookie: GMT: 1565495356 bytes = { 119, 88, 206, 84, 104, 18,
>  >>> 56, 110, 157, 162, 50, 247, 142, 47, 46, 11, 133, 196, 21, 108, 17,
>  >>> 205, 121, 220, 52, 127, 169, 241 }
>  >>> Session ID: {}
>  >>> Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
>  >>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
>  >>> TLS_RSA_WITH_AES_256_CBC_SHA256,
>  >>> TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
>  >>> ...
>  >>> Compression Methods: { 0 }
>  >>> Extension elliptic_curves, curve names: {secp256r1, secp384r1,
>  >>> secp521r1, sect283k1, sect283r1, sect409k1, sect409r1, sect571k1,
>  >>> sect571r1, secp256k1}
>  >>> Extension ec_point_formats, formats: [uncompressed]
>  >>> Extension signature_algorithms, signature_algorithms: SHA512withECDSA,
>  >>> SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA,
>  >>> SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA,
>  >>> SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
>  >>> Extension extended_master_secret
>  >>> Extension server_name, server_name: [type=host_name (0),
>  >>> value=bugs.openjdk.java.net]
>  >>> ***
>  >>> [write] MD5 and SHA1 hashes: len = 229
>  >>> 0000: 01 00 00 E1 03 03 5D 50 90 3C 77 58 CE 54 68 12 ......]P.<wX.Th.
>  >>> 0010: 38 6E 9D A2 32 F7 8E 2F 2E 0B 85 C4 15 6C 11 CD 8n..2../.....l..
>  >>> 0020: 79 DC 34 7F A9 F1 00 00 56 C0 24 C0 28 00 3D C0 y.4.....V.$.(.=.
>  >>> 0030: 26 C0 2A 00 6B 00 6A C0 0A C0 14 00 35 C0 05 C0 &.*.k.j.....5...
>  >>> ...
>  >>>
>  >>> However converting the timestamp found in the RandomCookie 1565495356
>  >>> gives 5D4F903C and not 5D50903C, which is the value found in the debug
>  >>> trace (line starting by "0000:")
>  >>> This of course doesn't break anything but I guess this is not the
>  >>> expected behaviour.
>  >>> The problem is reproducible depending on the current time. From my
>  >>> tests, the GMT value is wrong, and the value sent in the handshake
>  >>> itself is right. Probably RandomCookie.print() is facing the
>  >>> endianness problem, and I suggest the following patch that I
>  >>> unit-tested but not in JSSE itself :
>  >>>
>  >>> --- a/RandomCookie.java 2019-08-12 00:43:56.458000000 +0200
>  >>> +++ b/RandomCookie.java 2019-08-12 01:18:06.874000000 +0200
>  >>> @@ -70,10 +70,10 @@
>  >>> void print(PrintStream s) {
>  >>> int i, gmt_unix_time;
>  >>>
>  >>> - gmt_unix_time = random_bytes[0] << 24;
>  >>> - gmt_unix_time += random_bytes[1] << 16;
>  >>> - gmt_unix_time += random_bytes[2] << 8;
>  >>> - gmt_unix_time += random_bytes[3];
>  >>> + gmt_unix_time = ((random_bytes[0] & 0xFF) << 24) |
>  >>> + ((random_bytes[1] & 0xFF) << 16) |
>  >>> + ((random_bytes[2] & 0xFF) << 8) |
>  >>> + ((random_bytes[3] & 0xFF) << 0);
>  >>>
>  >>> s.print("GMT: " + gmt_unix_time + " ");
>  >>> s.print("bytes = { ");
>  >>>
>  >>>
>  >>> best regards
>  >>> Eugene Adell
>  >>>



More information about the security-dev mailing list