[jira] [Commented] (CXF-7941) SamlValidator does not work with chain trust

2019-01-24 Thread Tomas Vanhala (JIRA)


[ 
https://issues.apache.org/jira/browse/CXF-7941?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16750878#comment-16750878
 ] 

Tomas Vanhala commented on CXF-7941:


Thank you for fixing the constraint separator issue, very much appreciated.

We made some changes to our testclient, now it creates a request that is almost 
identical to request-real-sanitised.xml. Chain trust works just fine for this 
request.

The initally reported CXF/WSS4J behaviour was triggered by a request, which 
erroneously used PublicKey as the signing credentials of the KeyInfo. The 
prerequisites for chain trust are not present in this case, 

CXF/WSS4J works as designed.This bug report can be rejected. 

> SamlValidator does not work with chain trust
> 
>
> Key: CXF-7941
> URL: https://issues.apache.org/jira/browse/CXF-7941
> Project: CXF
>  Issue Type: Bug
>  Components: WS-* Components
>Affects Versions: 3.2.7
>Reporter: Tomas Vanhala
>Priority: Major
> Attachments: cxf7941.zip, obsolete-code.txt, 
> request-real-sanitised.xml, request-test-broken-sanitised.xml, 
> request-test-working-sanitised.xml, stacktrace-request-test-broken.txt
>
>
> As explained here 
> [http://coheigea.blogspot.com/2012/08/subject-dn-certificate-constraint.html,]
>  WSS4J supports specifying constraints on the subject DN of the certificate 
> used for signature validation.
> We have successfully applied "direct trust" when receiving SOAP requests 
> containing a signed SAML token.
> We attempted to migrate to "chain trust" by removing the certificate used to 
> sign the requests from the Merlin trust store, and setting an appropriate 
> Subject DN Cert Constraint.
> It did not work. Our analysis is that WSS4J's SamlValidator is not able to 
> handle a scenario where the certificate used to sign the requests is not in 
> the trust store. The problem seems to be in the method 
> findPublicKeyInKeyStore() of Merlin.java.
> We were able to make chain trust (and the Subject DN Cert Constraint) work by 
> including the needed PKI code in a customised SamlValidator, but we would 
> rather not go this route.
> Please fix chain trust in WSS4J SAML validation.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (CXF-7943) MAPCodec: Memory leak due to growing uncorrelatedExchanges

2019-01-24 Thread Adolfo Volpe (JIRA)


[ 
https://issues.apache.org/jira/browse/CXF-7943?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16751009#comment-16751009
 ] 

Adolfo Volpe commented on CXF-7943:
---

I think that the growth is caused by fault response received. Take a look at 
attachments.

> MAPCodec: Memory leak due to growing uncorrelatedExchanges
> --
>
> Key: CXF-7943
> URL: https://issues.apache.org/jira/browse/CXF-7943
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.2.0
> Environment: CXF 3.2.0, JDK 1.8
>Reporter: Sean
>Priority: Major
> Attachments: fault_req_resp.xml, histogram.PNG, leak_suspect_1.PNG, 
> mapcodec_leak.png
>
>
> When running load tests, my system begin to get memory leak after 4 hours or 
> so. When analyzing the heap dump using VisualVM (please see attachments), I 
> can see that a ConcurrentHashMap is taking up 1.7 GB of space in the heap, as 
> well as being the main "suspect" for this leak. This leads me to believe that 
> it is the uncorrelatedExchanges attribute since this map is being reference 
> from the MAPCodec class.
> I believe that the map, in my case, for whatever reason, does not always 
> remove the Exchange after the synchronous request/responses are done, however 
> I could be wrong.
>  
> IF this is indeed a bug, what could the cause of this be, as well as any work 
> around?



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (CXF-7943) MAPCodec: Memory leak due to growing uncorrelatedExchanges

2019-01-24 Thread Adolfo Volpe (JIRA)


 [ 
https://issues.apache.org/jira/browse/CXF-7943?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Adolfo Volpe updated CXF-7943:
--
Attachment: fault_req_resp.xml

> MAPCodec: Memory leak due to growing uncorrelatedExchanges
> --
>
> Key: CXF-7943
> URL: https://issues.apache.org/jira/browse/CXF-7943
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.2.0
> Environment: CXF 3.2.0, JDK 1.8
>Reporter: Sean
>Priority: Major
> Attachments: fault_req_resp.xml, histogram.PNG, leak_suspect_1.PNG, 
> mapcodec_leak.png
>
>
> When running load tests, my system begin to get memory leak after 4 hours or 
> so. When analyzing the heap dump using VisualVM (please see attachments), I 
> can see that a ConcurrentHashMap is taking up 1.7 GB of space in the heap, as 
> well as being the main "suspect" for this leak. This leads me to believe that 
> it is the uncorrelatedExchanges attribute since this map is being reference 
> from the MAPCodec class.
> I believe that the map, in my case, for whatever reason, does not always 
> remove the Exchange after the synchronous request/responses are done, however 
> I could be wrong.
>  
> IF this is indeed a bug, what could the cause of this be, as well as any work 
> around?



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (CXF-7943) MAPCodec: Memory leak due to growing uncorrelatedExchanges

2019-01-24 Thread Adolfo Volpe (JIRA)


 [ 
https://issues.apache.org/jira/browse/CXF-7943?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Adolfo Volpe updated CXF-7943:
--
Attachment: ok_req_resp.xml

> MAPCodec: Memory leak due to growing uncorrelatedExchanges
> --
>
> Key: CXF-7943
> URL: https://issues.apache.org/jira/browse/CXF-7943
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.2.0
> Environment: CXF 3.2.0, JDK 1.8
>Reporter: Sean
>Priority: Major
> Attachments: fault_req_resp.xml, histogram.PNG, leak_suspect_1.PNG, 
> mapcodec_leak.png, ok_req_resp.xml
>
>
> When running load tests, my system begin to get memory leak after 4 hours or 
> so. When analyzing the heap dump using VisualVM (please see attachments), I 
> can see that a ConcurrentHashMap is taking up 1.7 GB of space in the heap, as 
> well as being the main "suspect" for this leak. This leads me to believe that 
> it is the uncorrelatedExchanges attribute since this map is being reference 
> from the MAPCodec class.
> I believe that the map, in my case, for whatever reason, does not always 
> remove the Exchange after the synchronous request/responses are done, however 
> I could be wrong.
>  
> IF this is indeed a bug, what could the cause of this be, as well as any work 
> around?



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (CXF-7943) MAPCodec: Memory leak due to growing uncorrelatedExchanges

2019-01-24 Thread Adolfo Volpe (JIRA)


 [ 
https://issues.apache.org/jira/browse/CXF-7943?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Adolfo Volpe updated CXF-7943:
--
Attachment: mem_dump.png

> MAPCodec: Memory leak due to growing uncorrelatedExchanges
> --
>
> Key: CXF-7943
> URL: https://issues.apache.org/jira/browse/CXF-7943
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.2.0
> Environment: CXF 3.2.0, JDK 1.8
>Reporter: Sean
>Priority: Major
> Attachments: fault_req_resp.xml, histogram.PNG, leak_suspect_1.PNG, 
> mapcodec_leak.png, mem_dump.png, ok_req_resp.xml
>
>
> When running load tests, my system begin to get memory leak after 4 hours or 
> so. When analyzing the heap dump using VisualVM (please see attachments), I 
> can see that a ConcurrentHashMap is taking up 1.7 GB of space in the heap, as 
> well as being the main "suspect" for this leak. This leads me to believe that 
> it is the uncorrelatedExchanges attribute since this map is being reference 
> from the MAPCodec class.
> I believe that the map, in my case, for whatever reason, does not always 
> remove the Exchange after the synchronous request/responses are done, however 
> I could be wrong.
>  
> IF this is indeed a bug, what could the cause of this be, as well as any work 
> around?



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Comment Edited] (CXF-7943) MAPCodec: Memory leak due to growing uncorrelatedExchanges

2019-01-24 Thread Adolfo Volpe (JIRA)


[ 
https://issues.apache.org/jira/browse/CXF-7943?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16751009#comment-16751009
 ] 

Adolfo Volpe edited comment on CXF-7943 at 1/24/19 11:06 AM:
-

I think that the growth is caused by fault response received. Take a look at 
attachments. Today dump is growth to 1.5 Gb.


was (Author: volpe):
I think that the growth is caused by fault response received. Take a look at 
attachments.

> MAPCodec: Memory leak due to growing uncorrelatedExchanges
> --
>
> Key: CXF-7943
> URL: https://issues.apache.org/jira/browse/CXF-7943
> Project: CXF
>  Issue Type: Bug
>Affects Versions: 3.2.0
> Environment: CXF 3.2.0, JDK 1.8
>Reporter: Sean
>Priority: Major
> Attachments: fault_req_resp.xml, histogram.PNG, leak_suspect_1.PNG, 
> mapcodec_leak.png, mem_dump.png, ok_req_resp.xml
>
>
> When running load tests, my system begin to get memory leak after 4 hours or 
> so. When analyzing the heap dump using VisualVM (please see attachments), I 
> can see that a ConcurrentHashMap is taking up 1.7 GB of space in the heap, as 
> well as being the main "suspect" for this leak. This leads me to believe that 
> it is the uncorrelatedExchanges attribute since this map is being reference 
> from the MAPCodec class.
> I believe that the map, in my case, for whatever reason, does not always 
> remove the Exchange after the synchronous request/responses are done, however 
> I could be wrong.
>  
> IF this is indeed a bug, what could the cause of this be, as well as any work 
> around?



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Closed] (CXF-7941) SamlValidator does not work with chain trust

2019-01-24 Thread Colm O hEigeartaigh (JIRA)


 [ 
https://issues.apache.org/jira/browse/CXF-7941?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Colm O hEigeartaigh closed CXF-7941.


> SamlValidator does not work with chain trust
> 
>
> Key: CXF-7941
> URL: https://issues.apache.org/jira/browse/CXF-7941
> Project: CXF
>  Issue Type: Bug
>  Components: WS-* Components
>Affects Versions: 3.2.7
>Reporter: Tomas Vanhala
>Assignee: Colm O hEigeartaigh
>Priority: Major
> Attachments: cxf7941.zip, obsolete-code.txt, 
> request-real-sanitised.xml, request-test-broken-sanitised.xml, 
> request-test-working-sanitised.xml, stacktrace-request-test-broken.txt
>
>
> As explained here 
> [http://coheigea.blogspot.com/2012/08/subject-dn-certificate-constraint.html,]
>  WSS4J supports specifying constraints on the subject DN of the certificate 
> used for signature validation.
> We have successfully applied "direct trust" when receiving SOAP requests 
> containing a signed SAML token.
> We attempted to migrate to "chain trust" by removing the certificate used to 
> sign the requests from the Merlin trust store, and setting an appropriate 
> Subject DN Cert Constraint.
> It did not work. Our analysis is that WSS4J's SamlValidator is not able to 
> handle a scenario where the certificate used to sign the requests is not in 
> the trust store. The problem seems to be in the method 
> findPublicKeyInKeyStore() of Merlin.java.
> We were able to make chain trust (and the Subject DN Cert Constraint) work by 
> including the needed PKI code in a customised SamlValidator, but we would 
> rather not go this route.
> Please fix chain trust in WSS4J SAML validation.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Resolved] (CXF-7941) SamlValidator does not work with chain trust

2019-01-24 Thread Colm O hEigeartaigh (JIRA)


 [ 
https://issues.apache.org/jira/browse/CXF-7941?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Colm O hEigeartaigh resolved CXF-7941.
--
Resolution: Not A Problem

> SamlValidator does not work with chain trust
> 
>
> Key: CXF-7941
> URL: https://issues.apache.org/jira/browse/CXF-7941
> Project: CXF
>  Issue Type: Bug
>  Components: WS-* Components
>Affects Versions: 3.2.7
>Reporter: Tomas Vanhala
>Assignee: Colm O hEigeartaigh
>Priority: Major
> Attachments: cxf7941.zip, obsolete-code.txt, 
> request-real-sanitised.xml, request-test-broken-sanitised.xml, 
> request-test-working-sanitised.xml, stacktrace-request-test-broken.txt
>
>
> As explained here 
> [http://coheigea.blogspot.com/2012/08/subject-dn-certificate-constraint.html,]
>  WSS4J supports specifying constraints on the subject DN of the certificate 
> used for signature validation.
> We have successfully applied "direct trust" when receiving SOAP requests 
> containing a signed SAML token.
> We attempted to migrate to "chain trust" by removing the certificate used to 
> sign the requests from the Merlin trust store, and setting an appropriate 
> Subject DN Cert Constraint.
> It did not work. Our analysis is that WSS4J's SamlValidator is not able to 
> handle a scenario where the certificate used to sign the requests is not in 
> the trust store. The problem seems to be in the method 
> findPublicKeyInKeyStore() of Merlin.java.
> We were able to make chain trust (and the Subject DN Cert Constraint) work by 
> including the needed PKI code in a customised SamlValidator, but we would 
> rather not go this route.
> Please fix chain trust in WSS4J SAML validation.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Assigned] (CXF-7941) SamlValidator does not work with chain trust

2019-01-24 Thread Colm O hEigeartaigh (JIRA)


 [ 
https://issues.apache.org/jira/browse/CXF-7941?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Colm O hEigeartaigh reassigned CXF-7941:


Assignee: Colm O hEigeartaigh

> SamlValidator does not work with chain trust
> 
>
> Key: CXF-7941
> URL: https://issues.apache.org/jira/browse/CXF-7941
> Project: CXF
>  Issue Type: Bug
>  Components: WS-* Components
>Affects Versions: 3.2.7
>Reporter: Tomas Vanhala
>Assignee: Colm O hEigeartaigh
>Priority: Major
> Attachments: cxf7941.zip, obsolete-code.txt, 
> request-real-sanitised.xml, request-test-broken-sanitised.xml, 
> request-test-working-sanitised.xml, stacktrace-request-test-broken.txt
>
>
> As explained here 
> [http://coheigea.blogspot.com/2012/08/subject-dn-certificate-constraint.html,]
>  WSS4J supports specifying constraints on the subject DN of the certificate 
> used for signature validation.
> We have successfully applied "direct trust" when receiving SOAP requests 
> containing a signed SAML token.
> We attempted to migrate to "chain trust" by removing the certificate used to 
> sign the requests from the Merlin trust store, and setting an appropriate 
> Subject DN Cert Constraint.
> It did not work. Our analysis is that WSS4J's SamlValidator is not able to 
> handle a scenario where the certificate used to sign the requests is not in 
> the trust store. The problem seems to be in the method 
> findPublicKeyInKeyStore() of Merlin.java.
> We were able to make chain trust (and the Subject DN Cert Constraint) work by 
> including the needed PKI code in a customised SamlValidator, but we would 
> rather not go this route.
> Please fix chain trust in WSS4J SAML validation.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)