On Mon, 5 May 2025 08:50:07 GMT, Daniel Jeliński <djelin...@openjdk.org> wrote:

> Well, technically the current 1ms takes into account both the client side and 
> the server side of the handshake. Last time I checked, they were more or less 
> evenly split. The 1ms slowdown will happen entirely on the server side, so 
> it's more of a 3x slowdown.

Yes, good point, thanks!

> 
> Most of the time an extra millisecond doesn't matter, but it can be a factor 
> in the server startup time on a busy server. We currently invalidate all 
> session resumption tickets during server restart.

I see. But at the same time my understanding is that PKIX KeyManager's boot-up 
should be faster because it doesn't cache the whole KeyStore.

> 
> Re your point 3: what's the observable difference? If the certificate we can 
> offer doesn't meet the peer's expectations, will we fail the handshake on the 
> server side instead of failing on the client side, or is it something else?

Yes, we fail on the server side if we can't offer a certificate passing 
peer-supported algorithms in "signature_algorithms_cert" extension.

I put together a prototype of yet another KeyManager which can be a compromise 
solution: it's basically a `SunX509` with algorithm constraints: #25016

-------------

PR Comment: https://git.openjdk.org/jdk/pull/24756#issuecomment-2851050257

Reply via email to