Java 11 was released with TLSv1.3
support, used by default.
It works OK in context of HTTPS and SSL sockets, but it seems that when using SSLEngine
there are additional hurdles due to changes in TLSv1.3
behavior.
So there is a robust implementation of communication via NIO
using SSLEngine
that no longer works when TLSv1.3
is enabled. There are no obvious errors, in form of exceptions or SSL errors, two nodes will just send wrap/unwrap messages back and forth and eventually timeout.
I am interested in an exact list of behavior changes between SSLEngine using TLSv1.2 and SSLEngine using TLSv1.3, and if possible a migration checklist between these. Unfortunately, SSLEngine javadocs of Java 11 does not have this information - no new methods in Java 11 and no reference to TLSv1.3.
The connection itself is secure because symmetric cryptography is used to encrypt the data transmitted. The keys are uniquely generated for each connection and are based on a shared secret negotiated at the beginning of the session, also known as a TLS handshake.
The TLS Version 1.3 protocol is a major rewrite of the earlier TLS protocol standards. The intent of this protocol rewrite allows for more secure communications between peers and reduce the roundtrips necessary to complete a TLS V1. 3 handshake.
Starting with version 7.52. 0, curl provides TLS 1.3 support when built with a TLS library. TLS 1.3 protocol support is also currently available in the wolfSSL library. Since both curl and wolfSSL support TLS 1.3, curl can be compiled with the addition of wolfSSL to select the TLS 1.3 protocol.
It's true that there is no explicit reference to the impact of TLS 1.3 on SSLEngine
in its Javadoc in JDK 11, and there were no changes in its methods.
However the fifth item (closure) in the list of phases of SSLEngine
was updated in the general description at the start of its Javadoc in JDK 11:
Closure - When the connection is no longer needed, the client and the server applications should each close both sides of their respective connections. For
SSLEngine
objects, an application should callcloseOutbound()
and send any remaining messages to the peer. Likewise, an application should receive any remaining messages from the peer before callingcloseInbound()
. The underlying transport mechanism can then be closed after both sides of theSSLEngine
have been closed. If the connection is not closed in an orderly manner (for examplecloseInbound()
is called before the peer's write closure notification has been received), exceptions will be raised to indicate that an error has occurred. Once an engine is closed, it is not reusable: a newSSLEngine
must be created.
The change is also discussed in Oracle's Release Notes for JDK 11:
TLS 1.3 Half-Close Policy
A new system property,jdk.tls.acknowledgeCloseNotify
, has been added. The default value of the system property is false. If the system property is set to true, a correspondingclose_notify alert
will be sent when receiving aclose_notify
alert, and the connection will be duplex closed.TLS 1.2 and prior versions use a duplex-close policy, while TLS 1.3 uses a half-close policy. The inbound and the outbound close_notify alerts for TLS 1.3 are independent. When upgrading to TLS 1.3, unexpected behavior can occur if your application shuts down the (D)TLS connection by using only one of the
SSLEngine.closeInbound()
orSSLEngine.closeOutbound()
APIs, but not both in each side of the connection. If your application exhibits unexpected hangs or timeouts when the underlying (D)TLS transportation is not duplex closed, you may need to set this property to true.Note that when a TLS/DTLS connection is no longer needed, the client and server applications should each close both sides of their respective connection.
So setting jdk.tls.acknowledgeCloseNotify
to true might resolve your specific concern about timeouts when using SSlEngine
with TLS 1.3:
If your application exhibits unexpected hangs or timeouts when the underlying (D)TLS transportation is not duplex closed, you may need to set this property to true.
The Release Notes document also links to the closed JDK bug JDK-8208526 : TLS 1.3 half-close and synchronization issues which discusses the change in even greater detail.
The related (and closed) bug JDK-8207009 : TLS 1.3 half-close and synchronization issues may also be of interest.
Other References:
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With