RFR: 8331682: Slow networks/Impatient clients can potentially send unencrypted TLSv1.3 alerts that won't parse on the server [v26]
Artur Barashev
abarashev at openjdk.org
Tue Oct 29 20:35:16 UTC 2024
On Tue, 29 Oct 2024 19:49:05 GMT, Xue-Lei Andrew Fan <xuelei at openjdk.org> wrote:
>> Artur Barashev has updated the pull request incrementally with one additional commit since the last revision:
>>
>> Remove logging
>
> src/java.base/share/classes/sun/security/ssl/SSLCipher.java line 1875:
>
>> 1873: "fragment (" + bb.remaining() + "). Needs to be " +
>> 1874: "more than tag size (" + tagSize + ")");
>> 1875: }
>
> From the context, we only know the record is an alert message. We don't actually know it is plaintext or not. But I will have you for the final decision.
>
> There are another "Insufficient buffer remaining" exception in the SSLCipher class, we may want to keep the behavior consistent, with similar update. But I am fine to do it separately.
>
> I am going to approve it.
- I'm not sure what you mean by `plaintext`, what is your definition of plaintext? Per TLS1.3 RFC it's a plaintext unless contentType == 23
- About other "Insufficient buffer remaining" exceptions: from what we know so far this problem is specific to TLSv1.3, so I think we'll deal with other cases separately if needed in the future.
-------------
PR Review Comment: https://git.openjdk.org/jdk/pull/21043#discussion_r1821495642
More information about the security-dev
mailing list