Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(44)

Issue 1138813003: Use cert config options in SSLServerSocketOpenSSL. (Closed)

Created:
5 years, 7 months ago by Sergey Ulanov
Modified:
5 years, 7 months ago
Reviewers:
Bill Hesse, davidben
CC:
chromium-reviews, cbentzel+watch_chromium.org, chromoting-reviews_chromium.org
Base URL:
https://chromium.googlesource.com/chromium/src.git@master
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

Use cipher suite config options in SSLServerSocketOpenSSL. Previously SSLServerSocketOpenSSL was ignoring disabled_cipher_suites list and require_forward_secrecy flag from SSLConfig. Fixed SSLServerSocketOpenSSL to trim the list of cipher suites used in BoringSSL. BUG=481163 Committed: https://crrev.com/d0eae58087e6f45088d6ef349d9ebaa2da450ea1 Cr-Commit-Position: refs/heads/master@{#329528} Committed: https://crrev.com/ff826d5ebbddde14ca7e813b5c86a76d7ec6519d Cr-Commit-Position: refs/heads/master@{#329707}

Patch Set 1 : #

Total comments: 11

Patch Set 2 : #

Total comments: 16

Patch Set 3 : #

Patch Set 4 : #

Total comments: 4

Patch Set 5 : #

Unified diffs Side-by-side diffs Delta from patch set Stats (+97 lines, -19 lines) Patch
M net/socket/ssl_server_socket_nss.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M net/socket/ssl_server_socket_openssl.cc View 1 2 2 chunks +43 lines, -0 lines 0 comments Download
M net/socket/ssl_server_socket_unittest.cc View 1 2 3 4 2 chunks +46 lines, -10 lines 0 comments Download
M net/ssl/ssl_config.h View 1 1 chunk +4 lines, -4 lines 0 comments Download
M net/ssl/ssl_config.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M net/ssl/ssl_config_service.cc View 1 1 chunk +1 line, -2 lines 0 comments Download
M remoting/protocol/ssl_hmac_channel_authenticator.cc View 1 2 3 1 chunk +1 line, -1 line 0 comments Download

Messages

Total messages: 32 (9 generated)
Sergey Ulanov
5 years, 7 months ago (2015-05-11 18:58:46 UTC) #3
davidben
Unit test? Unfortunately, our API for controlling the SSLClientSocket ciphers to test against is pretty ...
5 years, 7 months ago (2015-05-12 00:00:51 UTC) #4
Sergey Ulanov
PTAL. Added unittest as you suggested https://codereview.chromium.org/1138813003/diff/20001/net/socket/ssl_server_socket_openssl.cc File net/socket/ssl_server_socket_openssl.cc (right): https://codereview.chromium.org/1138813003/diff/20001/net/socket/ssl_server_socket_openssl.cc#newcode704 net/socket/ssl_server_socket_openssl.cc:704: const uint16 id ...
5 years, 7 months ago (2015-05-12 18:55:47 UTC) #5
davidben
Thanks for adding the test! Just a handful more comments. https://codereview.chromium.org/1138813003/diff/20001/net/socket/ssl_server_socket_openssl.cc File net/socket/ssl_server_socket_openssl.cc (right): https://codereview.chromium.org/1138813003/diff/20001/net/socket/ssl_server_socket_openssl.cc#newcode710 ...
5 years, 7 months ago (2015-05-12 19:05:17 UTC) #6
Sergey Ulanov
https://codereview.chromium.org/1138813003/diff/40001/net/socket/ssl_server_socket_openssl.cc File net/socket/ssl_server_socket_openssl.cc (right): https://codereview.chromium.org/1138813003/diff/40001/net/socket/ssl_server_socket_openssl.cc#newcode699 net/socket/ssl_server_socket_openssl.cc:699: "DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK:!RC4"); On 2015/05/12 19:05:16, David Benjamin wrote: > On ...
5 years, 7 months ago (2015-05-12 19:42:21 UTC) #7
davidben
lgtm https://codereview.chromium.org/1138813003/diff/40001/net/socket/ssl_server_socket_unittest.cc File net/socket/ssl_server_socket_unittest.cc (right): https://codereview.chromium.org/1138813003/diff/40001/net/socket/ssl_server_socket_unittest.cc#newcode597 net/socket/ssl_server_socket_unittest.cc:597: client_ssl_config_.disabled_cipher_suites = { On 2015/05/12 19:42:21, Sergey Ulanov ...
5 years, 7 months ago (2015-05-12 19:46:11 UTC) #8
davidben
Oh, last minor nit: change "cert" to "cipher suite" in the description. Those are definitely ...
5 years, 7 months ago (2015-05-12 19:46:48 UTC) #9
davidben
On 2015/05/12 19:46:48, David Benjamin wrote: > Oh, last minor nit: change "cert" to "cipher ...
5 years, 7 months ago (2015-05-12 19:47:05 UTC) #10
Sergey Ulanov
On 2015/05/12 19:46:48, David Benjamin wrote: > Oh, last minor nit: change "cert" to "cipher ...
5 years, 7 months ago (2015-05-12 19:53:09 UTC) #11
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1138813003/60001
5 years, 7 months ago (2015-05-12 19:54:38 UTC) #13
commit-bot: I haz the power
Try jobs failed on following builders: linux_chromium_gn_dbg on tryserver.chromium.linux (JOB_FAILED, http://build.chromium.org/p/tryserver.chromium.linux/builders/linux_chromium_gn_dbg/builds/71240)
5 years, 7 months ago (2015-05-12 20:07:14 UTC) #15
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1138813003/80001
5 years, 7 months ago (2015-05-12 21:19:37 UTC) #18
commit-bot: I haz the power
Committed patchset #4 (id:80001)
5 years, 7 months ago (2015-05-12 23:10:23 UTC) #19
commit-bot: I haz the power
Patchset 4 (id:??) landed as https://crrev.com/d0eae58087e6f45088d6ef349d9ebaa2da450ea1 Cr-Commit-Position: refs/heads/master@{#329528}
5 years, 7 months ago (2015-05-12 23:11:13 UTC) #20
benwells
A revert of this CL (patchset #4 id:80001) has been created in https://codereview.chromium.org/1131573005/ by benwells@chromium.org. ...
5 years, 7 months ago (2015-05-13 06:02:09 UTC) #21
Bill Hesse
https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc File net/socket/ssl_server_socket_unittest.cc (right): https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc#newcode624 net/socket/ssl_server_socket_unittest.cc:624: server_ret = handshake_callback.GetResult(client_ret); Drive-by comment - should this really ...
5 years, 7 months ago (2015-05-13 12:04:02 UTC) #23
davidben
https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc File net/socket/ssl_server_socket_unittest.cc (right): https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc#newcode624 net/socket/ssl_server_socket_unittest.cc:624: server_ret = handshake_callback.GetResult(client_ret); On 2015/05/13 12:04:01, Bill Hesse wrote: ...
5 years, 7 months ago (2015-05-13 15:09:23 UTC) #24
davidben
https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc File net/socket/ssl_server_socket_unittest.cc (right): https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc#newcode624 net/socket/ssl_server_socket_unittest.cc:624: server_ret = handshake_callback.GetResult(client_ret); On 2015/05/13 15:09:23, David Benjamin wrote: ...
5 years, 7 months ago (2015-05-13 15:09:57 UTC) #25
Sergey Ulanov
https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc File net/socket/ssl_server_socket_unittest.cc (right): https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_socket_unittest.cc#newcode624 net/socket/ssl_server_socket_unittest.cc:624: server_ret = handshake_callback.GetResult(client_ret); On 2015/05/13 15:09:23, David Benjamin wrote: ...
5 years, 7 months ago (2015-05-13 18:18:02 UTC) #26
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1138813003/100001
5 years, 7 months ago (2015-05-13 18:20:42 UTC) #29
commit-bot: I haz the power
Committed patchset #5 (id:100001)
5 years, 7 months ago (2015-05-13 20:35:30 UTC) #30
commit-bot: I haz the power
Patchset 5 (id:??) landed as https://crrev.com/ff826d5ebbddde14ca7e813b5c86a76d7ec6519d Cr-Commit-Position: refs/heads/master@{#329707}
5 years, 7 months ago (2015-05-13 20:36:14 UTC) #31
Sergey Ulanov
5 years, 7 months ago (2015-05-13 23:53:00 UTC) #32
Message was sent while issue was closed.
On 2015/05/13 18:18:02, Sergey Ulanov wrote:
>
https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_s...
> File net/socket/ssl_server_socket_unittest.cc (right):
> 
>
https://codereview.chromium.org/1138813003/diff/80001/net/socket/ssl_server_s...
> net/socket/ssl_server_socket_unittest.cc:624: server_ret =
> handshake_callback.GetResult(client_ret);
> On 2015/05/13 15:09:23, David Benjamin wrote:
> > On 2015/05/13 12:04:01, Bill Hesse wrote:
> > > Drive-by comment - should this really be client_ret, not server_ret?
> > 
> > Erf, I should have noticed that. Yes it should. Though if it fixes the leak,
> > that still suggests an underlying bug in SSLServerSocketNSS or NSS itself
> > (neither of which would surprise me much).
> 
> Fixed now and looks like it does fix the leak.

Actually the problem is still there - it's detected by valgrind, but not ASan
and that's why I thought it was fixed. The problem seems to be that
ssl3_HandleClientHello() doesn't free sid when it returns error, particularly
when it fails with SSL_ERROR_NO_CYPHER_OVERLAP. I.e. the bug is in NSS

Powered by Google App Engine
This is Rietveld 408576698