Skip to content

Commit 4662e06

Browse files
committedJun 8, 2022
8277307: Pre shared key sent under both session_ticket and pre_shared_key extensions
Reviewed-by: coffeys, ascarpino
1 parent 7df48f9 commit 4662e06

File tree

2 files changed

+19
-7
lines changed

2 files changed

+19
-7
lines changed
 

‎src/java.base/share/classes/sun/security/ssl/SessionTicketExtension.java

+5-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2019, 2020, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2019, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -403,11 +403,13 @@ public byte[] produce(ConnectionContext context,
403403
chc.statelessResumption = true;
404404

405405
// If resumption is not in progress, return an empty value
406-
if (!chc.isResumption || chc.resumingSession == null) {
406+
if (!chc.isResumption || chc.resumingSession == null
407+
|| chc.resumingSession.getPskIdentity() == null
408+
|| chc.resumingSession.getProtocolVersion().useTLS13PlusSpec()) {
407409
if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
408410
SSLLogger.fine("Stateless resumption supported");
409411
}
410-
return new SessionTicketSpec().getEncoded();
412+
return new byte[0];
411413
}
412414

413415
if (chc.localSupportedSignAlgs == null) {

‎test/jdk/javax/net/ssl/SSLSession/ResumeTLS13withSNI.java

+14-4
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2018, 2021, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2018, 2022, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -26,7 +26,7 @@
2626

2727
/*
2828
* @test
29-
* @bug 8211806 8277881
29+
* @bug 8211806 8277881 8277307
3030
* @summary TLS 1.3 handshake server name indication is missing on a session resume
3131
* @run main/othervm ResumeTLS13withSNI
3232
*/
@@ -102,7 +102,7 @@ public static void main(String args[]) throws Exception {
102102
SSLParameters cliSSLParams = clientEngine.getSSLParameters();
103103
cliSSLParams.setServerNames(List.of(SNI_NAME));
104104
clientEngine.setSSLParameters(cliSSLParams);
105-
clientEngine.setEnabledProtocols(new String[] { "TLSv1.3" });
105+
clientEngine.setEnabledProtocols(new String[] { "TLSv1.2", "TLSv1.3" });
106106

107107
SSLEngine serverEngine = makeEngine(sslCtx, kmf, tmf, false);
108108
SSLParameters servSSLParams = serverEngine.getSSLParameters();
@@ -114,7 +114,7 @@ public static void main(String args[]) throws Exception {
114114
// Create a new client-side engine which can initiate TLS session
115115
// resumption
116116
SSLEngine newCliEngine = makeEngine(sslCtx, kmf, tmf, true);
117-
newCliEngine.setEnabledProtocols(new String[] { "TLSv1.3" });
117+
newCliEngine.setEnabledProtocols(new String[] { "TLSv1.2", "TLSv1.3" });
118118
ByteBuffer resCliHello = getResumptionClientHello(newCliEngine);
119119

120120
dumpBuffer("Resumed ClientHello Data", resCliHello);
@@ -394,6 +394,16 @@ private static void checkResumedClientHelloSNI(ByteBuffer resCliHello)
394394
System.err.println("* Found pre_shared_key Extension");
395395
resCliHello.position(resCliHello.position() + extLen);
396396
break;
397+
case 35: // session_ticket
398+
// This is a TLS1.2 extension; should be empty since we're
399+
// negotiating TLS1.3. See JDK-8277307
400+
System.err.format("* Found session_ticket extension " +
401+
"(%d bytes)\n", extLen);
402+
if (extLen != 0) {
403+
throw new Exception("Unexpected session_ticket content");
404+
}
405+
resCliHello.position(resCliHello.position() + extLen);
406+
break;
397407
default:
398408
System.err.format("* Found extension %d (%d bytes)\n",
399409
extType, extLen);

0 commit comments

Comments
 (0)
Please sign in to comment.