-
Bug
-
Resolution: Fixed
-
P3
-
11, 12, 13
-
b10
-
x86_64
-
windows_7
Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build |
---|---|---|---|---|---|---|
JDK-8256561 | 13.0.6 | Yuri Nesterenko | P3 | Resolved | Fixed | b01 |
JDK-8256334 | 13-pool | Alexey Bakhtin | P3 | Closed | Duplicate | b06 |
JDK-8264553 | 11.0.12-oracle | Dukebot | P3 | Resolved | Fixed | b01 |
JDK-8264974 | 11.0.12 | Xuelei Fan | P3 | Resolved | Fixed | b01 |
We are trying to disable RSASSA-PSS, because it is not supported in the JCE PKCS11 wrapper, and causes errors when setting up TLS1.2 errors.
It is possible to do this using jdk.tls.disabledAlgorithms with RSASSA-PSS, if this is done on both sides (client & server).
But if this is done only on the client side, which means the server still gives RSASSA-PSS as one of the options in it's CertificateRequest message, the client will still choose RSASSA-PSS and fail.
I think the core of the problem lies within the CertificateVerify.T12CertificateVerifyMessage constructor, which selects the signature algorithm as follows:
this.signatureScheme = SignatureScheme.getPreferableAlgorithm(
chc.peerRequestedSignatureSchemes,
x509Possession.popPrivateKey,
chc.negotiatedProtocol);
chc.peerRequestedSignatureSchemes holds -all- algorithms sent by the server in it's CertificateRequest message. Disabled algorithms are not filtered out.
The getPreferableAlgorithm method also does not consider disabled algorithms.
STEPS TO FOLLOW TO REPRODUCE THE PROBLEM :
Set up TLS 1.2 client with jdk.tls.disabledAlgorithms with RSASSA-PSS
Set up TLS 1.2 server which does not have RSASSA-PSS disabled
Connect the client to the server.
FREQUENCY : always
- backported by
-
JDK-8256561 Restrict TLS signature schemes and named groups
-
- Resolved
-
-
JDK-8264553 Restrict TLS signature schemes and named groups
-
- Resolved
-
-
JDK-8264974 Restrict TLS signature schemes and named groups
-
- Resolved
-
-
JDK-8256334 Restrict TLS signature schemes and named groups
-
- Closed
-
- csr for
-
JDK-8227445 Restrict TLS signature schemes and named groups
-
- Closed
-
- is blocked by
-
JDK-8226900 No AlgorithmParameters implementation for XDH/XEC
-
- Closed
-
-
JDK-8080704 Support the retrieval of standard names for EC parameters
-
- Closed
-
- relates to
-
JDK-8260300 Restrict TLS signature schemes in 8u
-
- Resolved
-
-
JDK-8257606 SSLHandshakeException: Cannot produce CertificateVerify signature
-
- Closed
-
-
JDK-8272351 Mutual TLS has stopped working - client certificates using RSA SHA256 not found
-
- Closed
-
-
JDK-8233228 Disable weak named curves by default in TLS, CertPath, and Signed JAR
-
- Resolved
-
-
JDK-8210755 Define standard names for EC curves and TLS signature schemes
-
- Resolved
-