SSLContext construction for SSL in Netty

Michael McGrady mmcgrady at topiatechnology.com
Mon Jul 20 14:17:44 EDT 2009


I have not looked at the Netty encryption process as yet.  If you  
encrypt after the chunking, that is a wholly different process as  
before the chunking.  We have a commercial product called "Skoot", see www.skootit.com 
, that encrypts chunks, rather than the stream or the file before  
chunking.  What needs to be watched is that you don't send 99.9% of a  
file (stream) and then have to start over due to a connection (etc)  
issue.

Let me look at your encryption a bit to examine the cooperation impact  
on chunking in Netty.

Mike

On Jul 20, 2009, at 7:26 AM, 이희승 (Trustin Lee) wrote:

> Oh, I didn't know about that.  Could you elaborate with me in detail?
>
> Thanks,
> Trustin
>
> On 07/20/2009 09:47 PM, Mike McGrady wrote:
>> Just  a side note, Trustin.  How does the chunking work with the SSL?
>> We have had to do some special things to accommodate SSL and chunking
>> in our case.
>>
>> MIke
>>
>> On Jul 19, 2009, at 10:47 PM, 이희승 (Trustin Lee) wrote:
>>
>>> I did a preliminary test with SSLContext.getDefault() using the
>>> SecureChat example, and it seems to work fine.  The following
>>> describes
>>> how I initialized SSLEngine in SecureChatPipelineFactory:
>>>
>>>       SSLEngine engine;
>>>       if (handler instanceof SecureChatClientHandler) {
>>>           engine = SSLContext.getDefault().createSSLEngine();
>>>           engine.setEnabledCipherSuites(new String[] {
>>> "TLS_DH_anon_WITH_AES_128_CBC_SHA" });
>>>           engine.setUseClientMode(true);
>>>       } else {
>>>           engine = SSLContext.getDefault().createSSLEngine();
>>>           engine.setEnabledCipherSuites(new String[] {
>>> "TLS_DH_anon_WITH_AES_128_CBC_SHA" });
>>>           engine.setUseClientMode(false);
>>>       }
>>>
>>> Using the default SSLContext on only one side also works fine.
>>>
>>> One interesting issue was that SSL handshake fails with the default
>>> SSLContext unless I set the 'enabledCipherSuites' explicitly.  On
>>> handshake failure, exceptionCaught event is triggered so that you  
>>> can
>>> close the failed connection.
>>>
>>> If you still believe that there is a problem with the default
>>> SSLContext, please post a test application that reproduces your
>>> problem.
>>>
>>> HTH,
>>> Trustin
>>>
>>> On 07/18/2009 12:24 AM, Jason Stevens wrote:
>>>> I'm using v3.1.0 CR1.  Just tried the latest build and I'm
>>>> experiencing
>>>> the same issue with it.
>>>>
>>>> Thanks,
>>>> Jason
>>>>
>>>> -----Original Message-----
>>>> From: netty-users-bounces at lists.jboss.org
>>>> [mailto:netty-users-bounces at lists.jboss.org] On Behalf Of "???
>>>> (Trustin
>>>> Lee)"
>>>> Sent: Thursday, July 16, 2009 6:25 PM
>>>> To: Netty -Users List
>>>> Subject: Re: SSLContext construction for SSL in Netty
>>>>
>>>> Hi Jason,
>>>>
>>>> Which Netty version are you using?  Could you let me know if you  
>>>> are
>>>> still having such a problem with the nightly build?
>>>>
>>>> Trustin
>>>>
>>>> On 07/17/2009 06:56 AM, jasons2645 wrote:
>>>>> I have a client/server app written atop Netty that works fine over
>>>>> SSL
>>>> when I
>>>>> initialize my SSLContext with a keystore, trust manager, etc.  But
>>>> when I
>>>>> use SSLContext.getDefault() as my context, the client/server stops
>>>> working.
>>>>> My log output indicates that a connection (channel) is  
>>>>> established,
>>>> but then
>>>>> no messages ever get read.
>>>>>
>>>>> Is this something I have hooked up incorrectly?  Or is what I'm
>>>>> trying
>>>> to do
>>>>> not supported by Netty or Java?
>>>>>
>>>>> Thanks,
>>>>> Jason
>>>> _______________________________________________
>>>> netty-users mailing list
>>>> netty-users at lists.jboss.org
>>>> https://lists.jboss.org/mailman/listinfo/netty-users
>>>>
>>>> _______________________________________________
>>>> netty-users mailing list
>>>> netty-users at lists.jboss.org
>>>> https://lists.jboss.org/mailman/listinfo/netty-users
>>> _______________________________________________
>>> netty-users mailing list
>>> netty-users at lists.jboss.org
>>> https://lists.jboss.org/mailman/listinfo/netty-users
>>
>> Mike McGrady
>> Principal Investigator AF081-028 AFRL SBIR
>> Senior Engineer
>> Topia Technology, Inc.
>> 1.253.720.3365
>> mmcgrady at topiatechnology.com
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> netty-users mailing list
>> netty-users at lists.jboss.org
>> https://lists.jboss.org/mailman/listinfo/netty-users
>
> _______________________________________________
> netty-users mailing list
> netty-users at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/netty-users

Mike McGrady
Principal Investigator AF081-028 AFRL SBIR
Senior Engineer
Topia Technology, Inc
1.253.720.3365
mmcgrady at topiatechnology.com










More information about the netty-users mailing list