Re: RFR: 8270290: NTLM authentication fails if HEAD request is used

2021-08-13 Thread Michael McMahon
Hi, A question about this issue. Can you explain why the server/proxy is sending a response body to a HEAD request? My reading of the RFCs suggests this is not allowed. Thanks, Michael On 12/07/2021 11:54, Alex Kasko wrote: On Mon, 12 Jul 2021 10:34:54 GMT, Alex Kasko wrote: When HEAD r

Re: RFR: 8272334: com.sun.net.httpserver.HttpExchange: Improve API doc of getRequestHeaders

2021-08-16 Thread Michael McMahon
On Thu, 12 Aug 2021 13:44:23 GMT, Julia Boes wrote: > This is a doc-only fix that improves the wording of the API doc of > `getRequestHeaders()`. The other changes are trivial cleanup. Marked as reviewed by michaelm (Reviewer). - PR: https://git.openjdk.java.net/jdk/pull/5100

Re: CFV: New Networking Group Member: Patrick Concannon

2021-08-27 Thread Michael McMahon
Vote: yes On 25/08/2021 10:09, Daniel Fuchs wrote: I hereby nominate Patrick Concannon to Membership in the Networking Group. Patrick is a Committer in the JDK project, and has been actively participating in the evolution and maintenance of the networking libraries for several years. Patrick

Re: Redundant Math.min call in Http2ClientImpl#getConnectionWindowSize

2021-08-27 Thread Michael McMahon
Thanks. I have filed https://bugs.openjdk.java.net/browse/JDK-8273059 to track this. - Michael. On 19/08/2021 19:50, Andrey Turbanov wrote: Hello. During investigation of results of IDEA inspections I found a redundant call to Math.min in a method jdk.internal.net.http.Http2ClientImpl#getConn

RFR: 8273059: Redundant Math.min call in Http2ClientImpl#getConnectionWindowSize

2021-08-27 Thread Michael McMahon
Hi, Could I get the following trivial change reviewed please? It removes a redundant call to Math.min(Integer.MAX_VALUE, ) Thanks, Michael. - Commit messages: - Removed redundant Math.min() call Changes: https://git.openjdk.java.net/jdk/pull/5277/files Webrev: https://webrevs

Re: RFR: 8273059: Redundant Math.min call in Http2ClientImpl#getConnectionWindowSize [v2]

2021-08-27 Thread Michael McMahon
> Hi, > > Could I get the following trivial change reviewed please? > It removes a redundant call to Math.min(Integer.MAX_VALUE, ) > > Thanks, > Michael. Michael McMahon has updated the pull request incrementally with one additional commit since the last revision:

Re: RFR: 8273059: Redundant Math.min call in Http2ClientImpl#getConnectionWindowSize [v3]

2021-08-27 Thread Michael McMahon
> Hi, > > Could I get the following trivial change reviewed please? > It removes a redundant call to Math.min(Integer.MAX_VALUE, ) > > Thanks, > Michael. Michael McMahon has updated the pull request incrementally with one additional commit since the last revision: m

Integrated: 8273059: Redundant Math.min call in Http2ClientImpl#getConnectionWindowSize

2021-08-30 Thread Michael McMahon
On Fri, 27 Aug 2021 12:01:25 GMT, Michael McMahon wrote: > Hi, > > Could I get the following trivial change reviewed please? > It removes a redundant call to Math.min(Integer.MAX_VALUE, ) > > Thanks, > Michael. This pull request has now been integrated. Chang

Re: RFR: 8245095: Implementation of JEP 408: Simple Web Server

2021-09-15 Thread Michael McMahon
On Tue, 14 Sep 2021 16:51:40 GMT, Daniel Fuchs wrote: >> src/jdk.httpserver/share/classes/com/sun/net/httpserver/HttpHandlers.java >> line 129: >> >>> 127: * response body bytes are a {@code UTF-8} encoded byte >>> sequence of >>> 128: * {@code body}. The response {@linkplain >>> Ht

Re: RFR: 8245095: Implementation of JEP 408: Simple Web Server [v2]

2021-09-15 Thread Michael McMahon
On Wed, 15 Sep 2021 08:42:40 GMT, Julia Boes wrote: >> src/jdk.httpserver/share/classes/com/sun/net/httpserver/HttpsServer.java >> line 152: >> >>> 150: return server; >>> 151: } >>> 152: >> >> Too bad we couldn't simplify the setting up a basic certificate for https. > > That wou

Re: RFR: 8245095: Implementation of JEP 408: Simple Web Server [v5]

2021-09-21 Thread Michael McMahon
On Tue, 21 Sep 2021 14:09:54 GMT, Julia Boes wrote: >> This change implements a simple web server that can be run on the >> command-line with `java -m jdk.httpserver`. >> >> This is facilitated by adding an entry point for the `jdk.httpserver` >> module, an implementation class whose main meth

Re: RFR: 8245095: Implementation of JEP 408: Simple Web Server [v5]

2021-09-21 Thread Michael McMahon
On Tue, 21 Sep 2021 14:09:54 GMT, Julia Boes wrote: >> This change implements a simple web server that can be run on the >> command-line with `java -m jdk.httpserver`. >> >> This is facilitated by adding an entry point for the `jdk.httpserver` >> module, an implementation class whose main meth

Re: RFR: 8245095: Implementation of JEP 408: Simple Web Server [v5]

2021-09-21 Thread Michael McMahon
On Tue, 21 Sep 2021 14:09:54 GMT, Julia Boes wrote: >> This change implements a simple web server that can be run on the >> command-line with `java -m jdk.httpserver`. >> >> This is facilitated by adding an entry point for the `jdk.httpserver` >> module, an implementation class whose main meth

Re: RFR: JDK-8273142 : Remove dependancy of TestHttpServer, HttpTransaction, HttpCallback from open/test/jdk/sun/net/www/protocol/http/ tests [v2]

2021-09-29 Thread Michael McMahon
On Wed, 22 Sep 2021 21:05:34 GMT, Mahendra Chhipa wrote: >> Dependencies of TestHttpServre, HttpTransaction, HttpCallback are removed >> from following tests: >> open/test/jdk/sun/net/www/protocol/http/ResponseCacheStream.java >> open/test/jdk/sun/net/www/protocol/http/SetChunkedStreamingMode.j

Re: RFR: JDK-8273142 : Remove dependancy of TestHttpServer, HttpTransaction, HttpCallback from open/test/jdk/sun/net/www/protocol/http/ tests [v2]

2021-09-29 Thread Michael McMahon
On Wed, 29 Sep 2021 13:45:43 GMT, Mahendra Chhipa wrote: >> test/jdk/sun/net/www/protocol/http/B6296310.java line 103: >> >>> 101: try(PrintWriter pw = new >>> PrintWriter(trans.getResponseBody())) { >>> 102: pw.print(""); >>> 103: } >> >> Not sure what the purpo

Re: RFR: JDK-8273142 : Remove dependancy of TestHttpServer, HttpTransaction, HttpCallback from open/test/jdk/sun/net/www/protocol/http/ tests [v2]

2021-09-30 Thread Michael McMahon
On Thu, 30 Sep 2021 09:05:41 GMT, Daniel Fuchs wrote: >> I think it would be simpler to replace lines 101-103 just with >> `trans.close()` > > Strictly speaking to preserve the current behavior - that would be > `trans.getResponseBody().close();` isn't it? HttpExchange.close() calls the close

Re: RFR: JDK-8273142 : Remove dependancy of TestHttpServer, HttpTransaction, HttpCallback from open/test/jdk/sun/net/www/protocol/http/ tests [v3]

2021-09-30 Thread Michael McMahon
On Thu, 30 Sep 2021 09:38:17 GMT, Mahendra Chhipa wrote: >> Dependencies of TestHttpServre, HttpTransaction, HttpCallback are removed >> from following tests: >> open/test/jdk/sun/net/www/protocol/http/ResponseCacheStream.java >> open/test/jdk/sun/net/www/protocol/http/SetChunkedStreamingMode.j

Re: RFR: 8270290: NTLM authentication fails if HEAD request is used [v2]

2021-09-30 Thread Michael McMahon
On Wed, 25 Aug 2021 14:21:59 GMT, Alex Kasko wrote: >> When HEAD request is used with a proxy (or a server) that requires NTLM, >> authentication fails when server returns large (8kb+) body along with >> NTLMSSP_CHALLENGE response. >> >> Proposed fix is to check for ongoing NTLM auth in `reset

Re: HttpClient Send Method Guaranteed Completion

2021-10-07 Thread Michael McMahon
I think we should at least clarify the behavior of HttpRequest.Builder.timeout() ie. that it is specifically related to the response headers, and maybe consider adding a timeout variant that sets the timeout for the entire response, including the body. - Michael. On 06/10/2021 10:42, Daniel F

Re: RFR: 8274779: HttpURLConnection: HttpClient and HttpsClient incorrectly check request method when set to POST [v3]

2021-10-15 Thread Michael McMahon
On Fri, 15 Oct 2021 14:47:18 GMT, Evan Whelan wrote: >> Hi, >> >> Please review my fix for JDK-8274779 which changes how HttpClient and >> HttpsClient checks for equality when comparing request methods. >> >> When `HttpURLConnection.setRequestMethod` is passed `new String("POST")` >> rather

Re: RFR: 8245095: Implementation of JEP 408: Simple Web Server [v9]

2021-10-18 Thread Michael McMahon
On Tue, 12 Oct 2021 10:40:15 GMT, Julia Boes wrote: >> This change implements a simple web server that can be run on the >> command-line with `java -m jdk.httpserver`. >> >> This is facilitated by adding an entry point for the `jdk.httpserver` >> module, an implementation class whose main meth

Re: RFR: 8245095: Implementation of JEP 408: Simple Web Server [v9]

2021-10-18 Thread Michael McMahon
On Tue, 12 Oct 2021 10:40:15 GMT, Julia Boes wrote: >> This change implements a simple web server that can be run on the >> command-line with `java -m jdk.httpserver`. >> >> This is facilitated by adding an entry point for the `jdk.httpserver` >> module, an implementation class whose main meth

Re: RFR: 8274779: HttpURLConnection: HttpClient and HttpsClient incorrectly check request method when set to POST [v4]

2021-10-20 Thread Michael McMahon
On Tue, 19 Oct 2021 13:48:24 GMT, Evan Whelan wrote: >> Hi, >> >> Please review my fix for JDK-8274779 which changes how HttpClient and >> HttpsClient checks for equality when comparing request methods. >> >> When `HttpURLConnection.setRequestMethod` is passed `new String("POST")` >> rather

Re: RFR: 8274779: HttpURLConnection: HttpClient and HttpsClient incorrectly check request method when set to POST [v3]

2021-10-20 Thread Michael McMahon
On Fri, 15 Oct 2021 15:11:06 GMT, Michael McMahon wrote: > Just wondering what actually happens if you encounter this bug? I guess that > the post will fail somehow because it has been given a closed connection. If > so, would it be possible to write the test to simulate that behavior

Re: RFR: 8275534: com.sun.net.httpserver.BasicAuthenticator should check whether "realm" is a quoted string

2021-10-27 Thread Michael McMahon
On Tue, 26 Oct 2021 12:46:31 GMT, Julia Boes wrote: > This change ensures that the realm string passed to the BasicAuthenticator > constructor is a quoted-string, as per RFC7230 [1]. A Utils class is added to > jdk.httpserver/sun.net.httpserver that holds the new isQuotedString() method > and

Re: RFR: 8244202: Implementation of JEP 418: Internet-Address Resolution SPI [v9]

2021-10-27 Thread Michael McMahon
On Tue, 26 Oct 2021 16:24:48 GMT, Aleksei Efimov wrote: >> This change implements a new service provider interface for host name and >> address resolution, so that java.net.InetAddress API can make use of >> resolvers other than the platform's built-in resolver. >> >> The following API classes

Re: RFR: 8275534: com.sun.net.httpserver.BasicAuthenticator should check whether "realm" is a quoted string

2021-10-29 Thread Michael McMahon
On Tue, 26 Oct 2021 13:31:35 GMT, Daniel Fuchs wrote: >> This change ensures that the realm string passed to the BasicAuthenticator >> constructor is a quoted-string, as per RFC7230 [1]. A Utils class is added >> to jdk.httpserver/sun.net.httpserver that holds the new isQuotedString() >> metho

Re: RFR: 8275534: com.sun.net.httpserver.BasicAuthenticator should check whether "realm" is a quoted string

2021-10-29 Thread Michael McMahon
On Fri, 29 Oct 2021 10:12:25 GMT, Daniel Fuchs wrote: >> I still think it is too much of a corner case to impose on the API doc so >> much. How about changing the @throws to >> >> >> * @throws IllegalArgumentException if realm is an empty string or is >> not correctly >> *

Re: RFR: 8275534: com.sun.net.httpserver.BasicAuthenticator should check whether "realm" is a quoted string

2021-10-29 Thread Michael McMahon
On Fri, 29 Oct 2021 10:28:39 GMT, Michael McMahon wrote: >> OK - but then I'd still say: `The value of the {@code realm} parameter will >> be embedded in a quoted string.` >> Otherwise the caller might think they need to provide a quoted string such >> as: "

Re: RFR: 8244202: Implementation of JEP 418: Internet-Address Resolution SPI [v10]

2021-11-01 Thread Michael McMahon
On Fri, 29 Oct 2021 16:17:46 GMT, Aleksei Efimov wrote: >> This change implements a new service provider interface for host name and >> address resolution, so that java.net.InetAddress API can make use of >> resolvers other than the platform's built-in resolver. >> >> The following API classes

Re: RFR: 8275534: com.sun.net.httpserver.BasicAuthenticator should check whether "realm" is a quoted string [v2]

2021-11-01 Thread Michael McMahon
On Mon, 1 Nov 2021 13:12:51 GMT, Julia Boes wrote: >> This change ensures that the realm string passed to the BasicAuthenticator >> constructor is a quoted-string, as per RFC7230 [1]. A Utils class is added >> to jdk.httpserver/sun.net.httpserver that holds the new isQuotedString() >> method a

Re: RFR: 8276774: Cookie stored in CookieHandler not sent if user headers contain cookie [v3]

2021-11-18 Thread Michael McMahon
On Wed, 17 Nov 2021 14:07:09 GMT, Daniel Fuchs wrote: >> Hi, >> >> Please find enclosed a patch that solves an unexpected interaction between >> server-set cookies and user-set cookies in the `java.net.HttpClient`. >> >> In JDK 12 we fixed >> [JDK-8213189](https://bugs.openjdk.java.net/browse

Re: RFR: 8276774: Cookie stored in CookieHandler not sent if user headers contain cookie [v5]

2021-11-19 Thread Michael McMahon
On Fri, 19 Nov 2021 10:12:15 GMT, Daniel Fuchs wrote: >> Hi, >> >> Please find enclosed a patch that solves an unexpected interaction between >> server-set cookies and user-set cookies in the `java.net.HttpClient`. >> >> In JDK 12 we fixed >> [JDK-8213189](https://bugs.openjdk.java.net/browse

Re: RFR: 8277459: Add jwebserver tool [v3]

2021-11-26 Thread Michael McMahon
On Wed, 24 Nov 2021 17:29:40 GMT, Julia Boes wrote: >> This change introduces jwebserver, a dedicated JDK tool for the Simple Web >> Server. >> >> A description is provided in a follow-up comment. > > Julia Boes has updated the pull request incrementally with one additional > commit since the

Re: Proposal - 8209137: Add ability to bind to specific local address to HTTP client

2021-12-03 Thread Michael McMahon
Yes, I agree with this. It's a niche use case which should be made clear in the docs. The new method should have a default implementation. I think I prefer also to use a SocketAddress in case there is some future need to also specify the local port. The InetSocketAddress constructors allow a

Re: RFR: 8278158: jwebserver should set request timeout

2021-12-07 Thread Michael McMahon
On Tue, 7 Dec 2021 10:24:31 GMT, Julia Boes wrote: > This change sets a maximum request time for the `jwebserver` (and `java -m > jdk.httpserver`), unless it has already been set. > > While here, I removed a comment from the implementation classes, a left-over > from the pre-module era that i

RFR: 8278312: Update SimpleSSLContext keystore to use SANs for localhost IP addresses

2021-12-09 Thread Michael McMahon
This updates the testkeys keystore file used by SimpleSSLContext in the test tree, in order to add subject alt names for the literal IP addresses "127.0.0.1" and "::1". This should allow the self signed certificate in the keystore to be accepted even when the local OS doesn't have a localhost to

Re: RFR: 8278312: Update SimpleSSLContext keystore to use SANs for localhost IP addresses

2021-12-09 Thread Michael McMahon
On Tue, 7 Dec 2021 15:03:31 GMT, Daniel Fuchs wrote: >> test/jdk/com/sun/net/httpserver/SANTest.java line 77: >> >>> 75: int port1 = s1.getAddress().getPort(); >>> 76: int port2 = s2.getAddress().getPort(); >>> 77: test ("127.0.0.1", root+"/test1", port2, "sma

Integrated: 8278312: Update SimpleSSLContext keystore to use SANs for localhost IP addresses

2021-12-09 Thread Michael McMahon
On Mon, 6 Dec 2021 21:27:48 GMT, Michael McMahon wrote: > This updates the testkeys keystore file used by SimpleSSLContext in the test > tree, in order to add subject alt names for the literal IP addresses > "127.0.0.1" and "::1". This should allow the s

RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-14 Thread Michael McMahon
Hi, This change adds Channel Binding Token (CBT) support to HTTPS (java.net.HttpsURLConnection) when used with the Negotiate (SPNEGO, Kerberos) authentication scheme. When enabled, the implementation preemptively includes a CBT with authentication requests over Kerberos. The feature is enabled

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-14 Thread Michael McMahon
On Thu, 13 Jan 2022 18:18:24 GMT, Daniel Fuchs wrote: >> Hi, >> >> This change adds Channel Binding Token (CBT) support to HTTPS >> (java.net.HttpsURLConnection) when used with the Negotiate (SPNEGO, >> Kerberos) authentication scheme. When enabled, the implementation >> preemptively includes

Re: RFR: 8278398: jwebserver: Add test to confirm maximum request time [v2]

2022-01-14 Thread Michael McMahon
On Thu, 13 Jan 2022 15:39:28 GMT, Julia Boes wrote: >> This new test confirms that the jwebserver does not wait indefinitely for a >> request to arrive, but instead closes the connection when the maximum >> request time is reached. To facilitate this, Exchange::run is amended to >> process can

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-14 Thread Michael McMahon
On Fri, 14 Jan 2022 14:52:13 GMT, Daniel Fuchs wrote: >> Hi, >> >> This change adds Channel Binding Token (CBT) support to HTTPS >> (java.net.HttpsURLConnection) when used with the Negotiate (SPNEGO, >> Kerberos) authentication scheme. When enabled, the implementation >> preemptively includes

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-19 Thread Michael McMahon
On Mon, 17 Jan 2022 13:49:35 GMT, Daniel Fuchs wrote: >> I vote for "jdk.https.tls.cbt" > >> It's actually a purely system property rather than a Net property at the >> moment (same as the other spnego ones). Maybe, I should convert them all to >> net properties, so they can be documented/set i

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-19 Thread Michael McMahon
On Mon, 17 Jan 2022 13:44:06 GMT, Daniel Fuchs wrote: >> Shall we log a message if the value is not one of the 3 forms? > > Usually malformed values are just ignored - and the property takes its > default value. But yes - s.n.w.h.HttpClient has a logger so it wouldn't be > much effort to log it

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-19 Thread Michael McMahon
On Sat, 15 Jan 2022 14:02:15 GMT, Michael Osipov wrote: >> I suggest moving the `TlsChannelBinding` class into >> `java.base/sun.security.util` since it's not only used by LDAP anymore. It's >> even not restricted to GSS-API. According to >> https://www.rfc-editor.org/rfc/rfc5056, "Although in

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-19 Thread Michael McMahon
On Wed, 19 Jan 2022 15:36:16 GMT, Michael McMahon wrote: >>> It's actually a purely system property rather than a Net property at the >>> moment (same as the other spnego ones). Maybe, I should convert them all to >>> net properties, so they can be documented

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-19 Thread Michael McMahon
On Fri, 14 Jan 2022 15:06:12 GMT, Daniel Fuchs wrote: > Have you been able to test this on a specific setup? Would be good to hear > from @msheppar too. I have tested it with the server setup by Prajwal. Security SQE are looking into configuring a server with a similar setup which can be teste

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v2]

2022-01-19 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v3]

2022-01-20 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v2]

2022-01-20 Thread Michael McMahon
On Wed, 19 Jan 2022 22:25:43 GMT, Weijun Wang wrote: >> Michael McMahon has updated the pull request incrementally with one >> additional commit since the last revision: >> >> changes after first review round > > src/java.naming/share/classes/com/sun/jndi/ld

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v3]

2022-01-21 Thread Michael McMahon
On Thu, 20 Jan 2022 11:04:18 GMT, Daniel Fuchs wrote: >> Michael McMahon has updated the pull request incrementally with one >> additional commit since the last revision: >> >> removed sasl module dependency and added SaslException cause > > src/java.base/share/

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v3]

2022-01-21 Thread Michael McMahon
On Thu, 20 Jan 2022 11:14:40 GMT, Michael Osipov wrote: >> Michael McMahon has updated the pull request incrementally with one >> additional commit since the last revision: >> >> removed sasl module dependency and added SaslException cause > > src/java.naming/s

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v3]

2022-01-21 Thread Michael McMahon
On Thu, 20 Jan 2022 11:16:16 GMT, Daniel Fuchs wrote: >> Michael McMahon has updated the pull request incrementally with one >> additional commit since the last revision: >> >> removed sasl module dependency and added SaslException cause > > src/java.base/s

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v3]

2022-01-21 Thread Michael McMahon
On Fri, 21 Jan 2022 13:38:08 GMT, Michael McMahon wrote: >> src/java.base/share/classes/sun/net/www/http/HttpClient.java line 189: >> >>> 187: } else { >>> 188: logError("Unexpected value for \"jdk.https.negotiate.cbt\" >>

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v4]

2022-01-21 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon has u

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v3]

2022-01-21 Thread Michael McMahon
On Fri, 21 Jan 2022 13:39:06 GMT, Michael Osipov wrote: >> Actually, it turns out I should be throwing `NamingException` here. That is >> what was being thrown by `TlsChannelBinding.parseType` before and an >> existing test was expecting that. NamingException only takes a String >> message. So

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v5]

2022-01-21 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McM

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v6]

2022-01-24 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon has update

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v5]

2022-01-24 Thread Michael McMahon
On Fri, 21 Jan 2022 19:48:02 GMT, Weijun Wang wrote: >> Michael McMahon has updated the pull request incrementally with one >> additional commit since the last revision: >> >> added root cause to NamingException > > src/java.base/share/classes/java/net/doc-file

Re: RFR: 8163921: HttpURLConnection default Accept header is malformed according to HTTP/1.1 RFC [v2]

2022-01-24 Thread Michael McMahon
On Fri, 21 Jan 2022 19:53:55 GMT, Daniel Jeliński wrote: >> Fix RFC compliance. >> Tier1 and tier2 passed. > > Daniel Jeliński has updated the pull request incrementally with one > additional commit since the last revision: > > Update copyright year src/java.base/share/classes/sun/net/www/pr

Re: RFR: 8163921: HttpURLConnection default Accept header is malformed according to HTTP/1.1 RFC [v2]

2022-01-24 Thread Michael McMahon
On Mon, 24 Jan 2022 14:38:02 GMT, Michael McMahon wrote: >> Daniel Jeliński has updated the pull request incrementally with one >> additional commit since the last revision: >> >> Update copyright year > > src/java.base/share/classes/sun/net/www/protocol/http/

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v6]

2022-01-24 Thread Michael McMahon
On Mon, 24 Jan 2022 15:23:44 GMT, Weijun Wang wrote: >> Michael McMahon has updated the pull request with a new target base due to a >> merge or a rebase. The incremental webrev excludes the unrelated changes >> brought in by the merge/rebase. The pull request contain

Re: RFR: 8163921: HttpURLConnection default Accept header is malformed according to HTTP/1.1 RFC [v3]

2022-01-24 Thread Michael McMahon
On Mon, 24 Jan 2022 18:07:36 GMT, Daniel Jeliński wrote: >> Fix RFC compliance. >> Tier1 and tier2 passed. > > Daniel Jeliński has updated the pull request incrementally with one > additional commit since the last revision: > > Update accept header to */* LGTM - Marked as revie

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v7]

2022-01-24 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon has u

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v8]

2022-01-25 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Mich

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v8]

2022-01-25 Thread Michael McMahon
On Tue, 25 Jan 2022 11:34:57 GMT, Michael Osipov wrote: >> Michael McMahon has updated the pull request incrementally with one >> additional commit since the last revision: >> >> final review update (pre CSR) > > src/java.base/share/classes/sun/net/www

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v9]

2022-01-26 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael Mc

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v10]

2022-01-26 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon has

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v11]

2022-01-27 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon has updated

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v12]

2022-01-27 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon has update

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v10]

2022-01-27 Thread Michael McMahon
On Thu, 27 Jan 2022 16:47:52 GMT, Daniel Fuchs wrote: >> It's `java.net.SocketException: Unexpected end of file from server`. Does >> not include any CBT words so don't know if it's worth parsing. > > Thanks. Then it would be better to catch only `SocketException` here rather > than `Exception`

Re: RFR: JDK-8280498: [aix]: jdk/java/net/Inet4Address/PingThis.java fails

2022-01-28 Thread Michael McMahon
On Fri, 28 Jan 2022 14:28:43 GMT, Alan Bateman wrote: >> with IP "0.0.0.0" >> >> - it either does nothing and ping fails, or, in some virtual environments >> is treated as the default route address. >> - IPv6 support for ::1 is available since 1977; however, ::0 is not accepted >> as a vaild psu

Re: RFR: JDK-8280498: [aix]: jdk/java/net/Inet4Address/PingThis.java fails

2022-01-28 Thread Michael McMahon
On Fri, 28 Jan 2022 14:46:32 GMT, Michael Felt wrote: >> If it defeats the purpose, then it needs to be skipped. >> >> * When I was trying to understand the test, it seemed to be that it >> _assumed_ that "0.0.0.0" was 'converted' to 127.0.0.1. >> * If there is an international standard (ISO, P

Re: RFR: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos [v13]

2022-01-28 Thread Michael McMahon
;, "b.c" and all hosts under the domain "d.com" and all of its > sub-domains. > > A test will be added separately to the implementation. > > Bug report: https://bugs.openjdk.java.net/browse/JDK-8279842 > > Thanks, > Michael Michael McMahon has

Integrated: 8279842: HTTPS Channel Binding support for Java GSS/Kerberos

2022-01-31 Thread Michael McMahon
On Thu, 13 Jan 2022 12:10:11 GMT, Michael McMahon wrote: > Hi, > > This change adds Channel Binding Token (CBT) support to HTTPS > (java.net.HttpsURLConnection) when used with the Negotiate (SPNEGO, Kerberos) > authentication scheme. When enabled, the implementation preemptivel

Re: RFR: 8280868: LineBodyHandlerTest.java creates and discards too many clients

2022-02-02 Thread Michael McMahon
On Fri, 28 Jan 2022 09:45:02 GMT, Daniel Fuchs wrote: > Please find enclosed a simple test fix for: > 8280868: LineBodyHandlerTest.java creates and discards too many clients > > The LineBodyHandlerTest.java creates and discards many clients (64). > The test has been observed failing intermittent

Re: RFR: 8280965: Tests com/sun/net/httpserver/simpleserver fail with FileSystemException on Windows 11

2022-02-03 Thread Michael McMahon
On Thu, 3 Feb 2022 09:24:46 GMT, Julia Boes wrote: > This change updates the tests in question to handle the case where sym link > creation is not supported, as observed on Windows 11 where additional > privileges are required to create sym links. > > Testing: tier 1-3 across platforms, plus t

RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable

2022-02-04 Thread Michael McMahon
Hi, Could I get the following patch reviewed please? (A CSR is also required which I will submit when the docs are agreed) It adds a pair of new system properties to make the keep alive timer in java.net.HttpURLConnection configurable. The proposed property names are: "http.keepAlive.time.serv

Re: RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable

2022-02-04 Thread Michael McMahon
On Fri, 4 Feb 2022 14:11:49 GMT, Daniel Fuchs wrote: >> Hi, >> >> Could I get the following patch reviewed please? (A CSR is also required >> which I will submit when the docs are agreed) >> >> It adds a pair of new system properties to make the keep alive timer in >> java.net.HttpURLConnecti

Re: RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable [v2]

2022-02-11 Thread Michael McMahon
posed property names are: > > "http.keepAlive.time.server" and "http.keepAlive.time.proxy" > > Thanks, > Michael Michael McMahon has updated the pull request with a new target base due to a merge or a rebase. The incremental webrev excludes the unrelated changes b

Re: RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable [v3]

2022-02-14 Thread Michael McMahon
posed property names are: > > "http.keepAlive.time.server" and "http.keepAlive.time.proxy" > > Thanks, > Michael Michael McMahon has updated the pull request with a new target base due to a merge or a rebase. The incremental webrev excludes the unrelated changes b

Re: RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable [v3]

2022-02-15 Thread Michael McMahon
On Mon, 14 Feb 2022 13:38:06 GMT, Daniel Fuchs wrote: >> Michael McMahon has updated the pull request with a new target base due to a >> merge or a rebase. The incremental webrev excludes the unrelated changes >> brought in by the merge/rebase. The pull request cont

Re: RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable [v4]

2022-02-15 Thread Michael McMahon
posed property names are: > > "http.keepAlive.time.server" and "http.keepAlive.time.proxy" > > Thanks, > Michael Michael McMahon has updated the pull request incrementally with one additional commit since the last revision: Fixed test case problem and update f

Re: RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable [v5]

2022-02-15 Thread Michael McMahon
posed property names are: > > "http.keepAlive.time.server" and "http.keepAlive.time.proxy" > > Thanks, > Michael Michael McMahon has updated the pull request incrementally with one additional commit since the last revision: tighten up spec wording and move props besid

Re: RFR: 8278067: Make HttpURLConnection default keep alive timeout configurable [v6]

2022-02-15 Thread Michael McMahon
posed property names are: > > "http.keepAlive.time.server" and "http.keepAlive.time.proxy" > > Thanks, > Michael Michael McMahon has updated the pull request incrementally with one additional commit since the last revision: remove extraneous .swp file - C

Integrated: 8278067: Make HttpURLConnection default keep alive timeout configurable

2022-02-16 Thread Michael McMahon
On Fri, 4 Feb 2022 13:11:02 GMT, Michael McMahon wrote: > Hi, > > Could I get the following patch reviewed please? (A CSR is also required > which I will submit when the docs are agreed) > > It adds a pair of new system properties to make the keep alive timer in > java.

Re: Integrated: 8282020: ProblemList sun/net/www/protocol/https/HttpsURLConnection/B6216082.java until JDK-8282017 is fixed

2022-02-16 Thread Michael McMahon
On Wed, 16 Feb 2022 21:27:40 GMT, Daniel Fuchs wrote: > Please find here a changeset to ProblemList > sun/net/www/protocol/https/HttpsURLConnection/B6216082.java until JDK-8282017 > is fixed LGTM - Marked as reviewed by michaelm (Reviewer). PR: https://git.openjdk.java.net/jdk/p

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
On Fri, 4 Mar 2022 09:37:21 GMT, Michael McMahon wrote: > Hi, > > Could I get the following change reviewed please, which is to disable the MD5 > message digest algorithm by default in the HTTP Digest authentication > mechanism? The algorithm can be opted into by setting a new

RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
Hi, Could I get the following change reviewed please, which is to disable the MD5 message digest algorithm by default in the HTTP Digest authentication mechanism? The algorithm can be opted into by setting a new system property "http.auth.digest.enabledDigestAlgs" to include the value MD5. The

Re: RFR: 8282617: sun.net.www.protocol.https.HttpsClient#putInKeepAliveCache() doesn't use a lock while dealing with inCache field

2022-03-04 Thread Michael McMahon
On Thu, 3 Mar 2022 16:13:37 GMT, Jaikiran Pai wrote: > Can I please get a review of this change which proposes to fix the issue > noted in https://bugs.openjdk.java.net/browse/JDK-8282617? > > The `HttpClient` class uses a `inCache` (internal) field to keep track of > whether a connection is

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
On Fri, 4 Mar 2022 11:25:38 GMT, Daniel Fuchs wrote: > Should we instead have a property to disable algorithms, whose default value > would contain "MD5" by default? I considered that and implemented it that way at the start, but what you would end up with then is users running their code with

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
On Fri, 4 Mar 2022 12:12:25 GMT, Daniel Fuchs wrote: > > I considered that and implemented it that way at the start, but what you > > would end up with then is users running their code with something like: > > -DdisabledAlgNames="" > > I find that style leads to a much less explicit "opting in"

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
On Fri, 4 Mar 2022 09:37:21 GMT, Michael McMahon wrote: > Hi, > > Could I get the following change reviewed please, which is to disable the MD5 > message digest algorithm by default in the HTTP Digest authentication > mechanism? The algorithm can be opted into by setting a new

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
On Fri, 4 Mar 2022 13:13:47 GMT, Daniel Fuchs wrote: >> Hi, >> >> Could I get the following change reviewed please, which is to disable the >> MD5 message digest algorithm by default in the HTTP Digest authentication >> mechanism? The algorithm can be opted into by setting a new system propert

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
On Fri, 4 Mar 2022 14:11:00 GMT, Jaikiran Pai wrote: >> Hi, >> >> Could I get the following change reviewed please, which is to disable the >> MD5 message digest algorithm by default in the HTTP Digest authentication >> mechanism? The algorithm can be opted into by setting a new system propert

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
On Fri, 4 Mar 2022 14:39:50 GMT, Jaikiran Pai wrote: >> Hi, >> >> Could I get the following change reviewed please, which is to disable the >> MD5 message digest algorithm by default in the HTTP Digest authentication >> mechanism? The algorithm can be opted into by setting a new system propert

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-04 Thread Michael McMahon
echanisms so the update won’t change the behavior? (If there is no negotiation?) Gruss Bernd -- http://bernd.eckenfels.net Von: net-dev im Auftrag von Michael McMahon Gesendet: Friday, March 4, 2022 1:33:06 PM An:net-dev@openjdk.java.net Betreff: Re: RFR: 8281561:

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-07 Thread Michael McMahon
On Fri, 4 Mar 2022 14:59:48 GMT, Weijun Wang wrote: >> Hi, >> >> Could I get the following change reviewed please, which is to disable the >> MD5 message digest algorithm by default in the HTTP Digest authentication >> mechanism? The algorithm can be opted into by setting a new system property

Re: RFR: 8281561: Disable http DIGEST mechanism with MD5 by default

2022-03-07 Thread Michael McMahon
On Fri, 4 Mar 2022 16:26:52 GMT, Weijun Wang wrote: >> Hi, >> >> Could I get the following change reviewed please, which is to disable the >> MD5 message digest algorithm by default in the HTTP Digest authentication >> mechanism? The algorithm can be opted into by setting a new system property

<    2   3   4   5   6   7   8   9   10   11   >