Am 12.10.2018 um 19:39 schrieb Mark Thomas:
On 12/10/18 15:55, George Stanchev wrote:
Mark,

Can you elaborate around the following:

<quote>
All combinations support server initiated requests for client certificates 
apart from NIO[2]+JSSE on Java 11 as the Java 11 TLSv1.3 implementation does 
not include post handshake authentication.
</quote>

What are the use cases affected. Is it for TLS upgrade when a certain resource 
is being requested?

Security constraints can require CLIENT-CERT authentication for some
URLs within a web application.

If the TLS connection is established before one of these URLs is
requested then either renegotiation (TLSv1.2 and earlier) or post
handshake authentication (TLSv1.3) is required to obtain the
certificates from the client.

Tomcat supports this for all combinations of TLSv1.2. It supports it for
TLSv1.3 only when OpenSSL is providing the encryption. With pure Java
(JSSE, Java 11+) it is not supported because Java has not (yet?)
implemented post handshake authentication.

And for those who are not aware: post_handshake_auth is a new TLS extension in TLS 1.3 that's supposed to get used for that. The Java JEP (Java Enhancement Proposal) that defines the TLS1.3 support in Java 11 can eg. be found under

http://openjdk.java.net/jeps/332

It contains:

"The following significant features will not be implemented as part of this JEP:

...
- Post-handshake authentication
..."

There's a three month old open bug for implementing it with no noticeable activity:

https://bugs.openjdk.java.net/browse/JDK-8206923

Regards,

Rainer

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to