[RFR] 8229148: SSLSession.invalidate() does not invalidate stateless tickets

Bernd Eckenfels ecki at zusammenkunft.net
Tue Jun 16 01:43:52 UTC 2020


The change seems reasonable, but should there maybe a method to refresh temporary keys used for those session tokens - I.e. "invalidate all" and link to that so specific implementations are encourages to offer such an API.

Von: security-dev <security-dev-bounces at openjdk.java.net> im Auftrag von Anthony Scarpino <anthony.scarpino at oracle.com>
Gesendet: Tuesday, June 16, 2020 2:42:32 AM
An: OpenJDK Security <security-dev at openjdk.java.net>
Betreff: Re: [RFR] 8229148: SSLSession.invalidate() does not invalidate stateless tickets

The specifications for TLS 1.3 (RFC 8446) and Stateless Resumption for
TLS 1.2 (RFC 5077) does not define session invalidation. Additionally,
RFC 5077 provides research that it is unnecessary. This change is to
clarify that session invalidation method in the Java API, in
javax.net.ssl.SSLSession.invalidate(), may not be supported in some

The CSR is: https://bugs.openjdk.java.net/browse/JDK-8243678
The webrev is inline:

@@ -129,6 +129,12 @@
       * using this session can continue to use the session until the
       * connection is closed.
+     * @apiNote
+     * This operation is optional as the implementation may not support
+     * session invalidation.  This could occur with implementations of
+     * Stateless Resumption (RFC 5077) and/or TLS 1.3 (RFC 8446) which
+     * do not specify session invalidation.
+     *
       * @see #isValid()
      public void invalidate();
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.openjdk.java.net/pipermail/security-dev/attachments/20200616/4eb0094a/attachment.htm>

More information about the security-dev mailing list