Re: RFR: 8338380: Update TLSCommon/interop/AbstractServer to specify an interface to listen for connections [v2]

2024-08-21 Thread Matthew Donovan
> This is a small PR to extend the AbstractServer class in > test/jdk/javax/net/ssl/TLSCommon/interop/ to enable users to specify a > specific interface on which to listen for incoming connections. The default > interface is now the loopback interface. The derived class, JdkServer, is > also up

Re: RFR: 8319332: Security properties files inclusion [v20]

2024-08-21 Thread Francisco Ferrari Bihurriet
> The implementation of this proposal is based on the requirements, > specification and design choices described in the [JDK-8319332] ticket and > its respective CSR [JDK-8319333]. What follows are implementation notes > organized per functional component, with the purpose of assisting to naviga

Re: RFR: 8338380: Update TLSCommon/interop/AbstractServer to specify an interface to listen for connections

2024-08-21 Thread Rajan Halade
On Wed, 14 Aug 2024 12:22:47 GMT, Matthew Donovan wrote: > This is a small PR to extend the AbstractServer class in > test/jdk/javax/net/ssl/TLSCommon/interop/ to enable users to specify a > specific interface on which to listen for incoming connections. The default > interface is now the loop

Re: RFR: 8335288: SunPKCS11 initialization will call C_GetMechanismInfo on unsupported mechanisms [v2]

2024-08-21 Thread Valerie Peng
On Wed, 21 Aug 2024 16:48:23 GMT, Martin Balao wrote: > Looks good to me. Thanks Martin for the review~ - PR Comment: https://git.openjdk.org/jdk/pull/20207#issuecomment-2302556977

Re: RFR: 8335288: SunPKCS11 initialization will call C_GetMechanismInfo on unsupported mechanisms [v2]

2024-08-21 Thread Martin Balao
On Wed, 21 Aug 2024 00:09:25 GMT, Valerie Peng wrote: >> Can someone help review this fix? Changed the required-mechanism check by >> checking if the particular mechanism is inside the list of enabled supported >> mechanisms. This should be more reliable than calling C_GetMechanismInfo(..) >>

[SSL/TLS] Insecure defaults for server identity checking

2024-08-21 Thread Daniel JeliƄski
Hi all, By default the SSLSocket does not perform any server identity checks. This means that unless the user explicitly enables the checks, the connection will be vulnerable to man-in-the-middle attacks. Examples of vulnerable implementation can be found in the Java documentation, example links: h