Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1482)

Issue 10014010: net: False Start only for NPN capable servers. (Closed)

Created:
8 years, 8 months ago by agl2
Modified:
8 years, 8 months ago
CC:
chromium-reviews, Ryan Sleevi
Visibility:
Public.

Description

net: False Start only for NPN capable servers. This change causes NSS only to False Start with NPN capable servers. It also removes the False Start blacklist and this has the effect of enabling 1/n-1 record splitting for those hosts that were previously on the blacklist. However, those hosts have been getting 1/n-1 from Opera, Firefox and IE for a few months now. BUG=none TEST=net_unittests Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=131649

Patch Set 1 #

Total comments: 7
Unified diffs Side-by-side diffs Delta from patch set Stats (+14 lines, -2814 lines) Patch
M net/base/ssl_config_service.h View 1 chunk +0 lines, -4 lines 0 comments Download
M net/base/ssl_config_service.cc View 2 chunks +0 lines, -7 lines 0 comments Download
M net/base/ssl_config_service_unittest.cc View 2 chunks +0 lines, -20 lines 0 comments Download
D net/base/ssl_false_start_blacklist.h View 1 chunk +0 lines, -79 lines 0 comments Download
D net/base/ssl_false_start_blacklist.cc View 1 chunk +0 lines, -31 lines 0 comments Download
D net/base/ssl_false_start_blacklist.txt View 1 chunk +0 lines, -2288 lines 0 comments Download
D net/base/ssl_false_start_blacklist_process.cc View 1 chunk +0 lines, -214 lines 0 comments Download
D net/base/ssl_false_start_blacklist_unittest.cc View 1 chunk +0 lines, -39 lines 0 comments Download
M net/net.gyp View 5 chunks +0 lines, -46 lines 0 comments Download
M net/socket/ssl_client_socket_nss.h View 2 chunks +0 lines, -7 lines 1 comment Download
M net/socket/ssl_client_socket_nss.cc View 8 chunks +4 lines, -72 lines 4 comments Download
M net/socket/ssl_client_socket_openssl.cc View 1 chunk +0 lines, -7 lines 0 comments Download
M net/third_party/nss/README.chromium View 1 chunk +3 lines, -0 lines 0 comments Download
M net/third_party/nss/patches/applypatches.sh View 1 chunk +2 lines, -0 lines 0 comments Download
M net/third_party/nss/ssl/ssl3con.c View 1 chunk +1 line, -0 lines 1 comment Download
M net/third_party/nss/ssl/ssl3ext.c View 2 chunks +4 lines, -0 lines 1 comment Download

Messages

Total messages: 11 (0 generated)
agl
8 years, 8 months ago (2012-04-09 22:31:45 UTC) #1
Ryan Sleevi
Two questions below, but otherwise looks fine. https://chromiumcodereview.appspot.com/10014010/diff/1/net/socket/ssl_client_socket_nss.cc File net/socket/ssl_client_socket_nss.cc (left): https://chromiumcodereview.appspot.com/10014010/diff/1/net/socket/ssl_client_socket_nss.cc#oldcode123 net/socket/ssl_client_socket_nss.cc:123: static const ...
8 years, 8 months ago (2012-04-09 22:42:56 UTC) #2
agl
https://chromiumcodereview.appspot.com/10014010/diff/1/net/socket/ssl_client_socket_nss.cc File net/socket/ssl_client_socket_nss.cc (left): https://chromiumcodereview.appspot.com/10014010/diff/1/net/socket/ssl_client_socket_nss.cc#oldcode123 net/socket/ssl_client_socket_nss.cc:123: static const int kCorkTimeoutMs = 200; On 2012/04/09 22:42:56, ...
8 years, 8 months ago (2012-04-09 23:05:30 UTC) #3
Ryan Sleevi
Great, thanks. LGTM.
8 years, 8 months ago (2012-04-09 23:07:59 UTC) #4
willchan no longer on Chromium
On 2012/04/09 23:07:59, Ryan Sleevi wrote: > Great, thanks. > > LGTM. This change makes ...
8 years, 8 months ago (2012-04-10 06:39:18 UTC) #5
agl2
On Tue, Apr 10, 2012 at 2:39 AM, <willchan@chromium.org> wrote: > This change makes me ...
8 years, 8 months ago (2012-04-10 14:48:17 UTC) #6
willchan no longer on Chromium
Let me preface this by saying that I fully expect to be unhappy no matter ...
8 years, 8 months ago (2012-04-10 15:03:12 UTC) #7
ian fette
lgtm I think all of us are somewhat disappointed; at the end of the day ...
8 years, 8 months ago (2012-04-10 17:12:14 UTC) #8
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-status.appspot.com/cq/agl@google.com/10014010/1
8 years, 8 months ago (2012-04-10 20:04:43 UTC) #9
commit-bot: I haz the power
Change committed as 131649
8 years, 8 months ago (2012-04-10 22:34:39 UTC) #10
wtc
8 years, 8 months ago (2012-04-17 22:46:09 UTC) #11
Drive-by review comments:

https://chromiumcodereview.appspot.com/10014010/diff/1/net/socket/ssl_client_...
File net/socket/ssl_client_socket_nss.h (left):

https://chromiumcodereview.appspot.com/10014010/diff/1/net/socket/ssl_client_...
net/socket/ssl_client_socket_nss.h:150: void UncorkAfterTimeout();

It seems that the corking code is still useful to force
false-start-incompatible implementations to fail more
deterministically.

https://chromiumcodereview.appspot.com/10014010/diff/1/net/third_party/nss/ss...
File net/third_party/nss/ssl/ssl3con.c (right):

https://chromiumcodereview.appspot.com/10014010/diff/1/net/third_party/nss/ss...
net/third_party/nss/ssl/ssl3con.c:6089: ssl3_ExtensionNegotiated(ss,
ssl_next_proto_nego_xtn) &&

If we do it this way, we need to update the documentation
of SSL_ENABLE_FALSE_START in the NSS ssl.h header file.

Alternatively, NSS can let applications control this.
Chrome would call
SSL_HandshakeNegotiatedExtension(fd, ssl_next_proto_nego_xtn)
in SSLClientSocketNSS::OwnAuthCertHandler, and call
SSL_OptionSet(fd, SSL_ENABLE_FALSE_START, PR_FALSE) to
set ss->opt.enableFalseStart to PR_FALSE.

https://chromiumcodereview.appspot.com/10014010/diff/1/net/third_party/nss/ss...
File net/third_party/nss/ssl/ssl3ext.c (right):

https://chromiumcodereview.appspot.com/10014010/diff/1/net/third_party/nss/ss...
net/third_party/nss/ssl/ssl3ext.c:570:
ss->xtnData.negotiated[ss->xtnData.numNegotiated++] = ex_type;

Nit: please add a TODO or XXX comment that we also need to
call ssl3_RegisterServerHelloExtensionSender to register a
server hello extension sender.

Powered by Google App Engine
This is Rietveld 408576698