Hi Glen,
 
Thanks for the response.  I haven't had time to run the tests you suggested but hopefully this week I will be able to.
 
> hi David,
>
> For JSS with SSLServerSocket if you want to do a reconnect because your
> orginal cert you configured has expired
> is now INVALID you would have to re-call setServerCert or
> setServerCertNickname first and configure the new cert.
> For the JSS SSLSocket client connection you have the same methods.

> http://www.mozilla.org/projects/security/pki/jss/javadoc/org/mozilla/jss/ssl/SSLSocket.html
> http://www.mozilla.org/projects/security/pki/jss/javadoc/org/mozilla/jss/ssl/SSLServerSocket.html

> If this is a JSS issue  you should be able to recreate the issue by
> modifying  this JSS test program
> http://mxr.mozilla.org/security/source/security/jss/org/mozilla/jss/tests/SSLClientAuth.java 

>
> Please modify the test program to create a reproducible test case with
> the latest JSS, then attach it to a bug.
> Please list your exact version of NSPR/NSS/JSS/platform you're using.
>
> If your JSS stand alone test program works, then you should be able  to
> use the cert creation
> from SSLClientAuth.java to add the Java LDAP SDK and reproduce the bug.
> Then
> make a bug on the Java Ldap SDK team.
>
> I don't know how much development is being done on the Java LDAP SDK,
> but you're
> able to download the source build/debug/provide fix. Both JSS and the
> Java LDAP SDK
> are open source owned by the Mozilla Foundation and they welcome
> contributions.

> http://www.mozilla.org/directory/javasdk.html
>
> Note: in your c++ application if you're able to call NSS_Shutdown and
> re-initialize NSS,
> you could do the same with JSS. Some code to help:
> http://mxr.mozilla.org/security/source/security/jss/org/mozilla/jss/tests/CloseDBs.java
> But you shouldn't need to shutdown NSS and re-initialize this is really
> frowned upon.
> Your application may be 24X7 but this re-reinitialization of NSS is
> basically a
> restart of your application.
>
> Again once you installed your new certificates and your old certificates
> have INVALID_CREDENTIALS, provided your code doesn't keep trying to use
> the same handle to the
> old certificates and instead before attempting to reconnect it obtains
> new handles
> to the new valid  certificates then tries a new connection every thing
> should work fine.

> Please create a reproducible test case. I expect in the process of doing
> so you
> should fix this issue, if not when you have a reproducible JSS test case
> I will
> see what I can do. If the issue is with the Java LDAP SDK then likely a fix
> would be  needed to the reconnect method.

> -glen

>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to