Some Eclipse Foundation services are deprecated, or will be soon. Please ensure you've read this important communication.

Bug 187887

Summary: The JVMTI agent does not work with secure AC
Product: z_Archived Reporter: amehrega
Component: TPTPAssignee: Igor Alelekov <igor.alelekov>
Status: CLOSED FIXED QA Contact:
Severity: critical    
Priority: P1 CC: jkubasta, kiryl.kazakevich, popescu, samwai, sluiman
Version: unspecified   
Target Milestone: ---   
Hardware: PC   
OS: Windows XP   
Whiteboard: closed460
Attachments:
Description Flags
patch none

Description amehrega CLA 2007-05-18 15:16:47 EDT
Run a standalone installation of AC with security enabled.  Attempt to profile an application using the JVMTI agent.  Notice that an error is displayed about not being able to connect to the Agent Controller.

I'm not sure if JVMTI+Secure AC is a use case that we have committed to.
Comment 1 Guru Nagarajan CLA 2007-05-22 19:22:57 EDT
This was not committed to.
Comment 2 jkubasta CLA 2007-05-23 10:03:52 EDT
Guru, I believe this needs to be supported in i4.
Comment 3 Guru Nagarajan CLA 2007-05-23 10:32:16 EDT
Joanna,
  The NewAC does not support Security in its native mode. It supports security in the "Backward Compatiblity Mode"
If the AC can provide the security then the Execution framework resolution will resolve it. It has nothing to do with jvmti
Comment 4 Harm Sluiman CLA 2007-05-23 12:32:50 EDT
(In reply to comment #3)
> Joanna,
>   The NewAC does not support Security in its native mode. It supports security
> in the "Backward Compatiblity Mode"
> If the AC can provide the security then the Execution framework resolution will
> resolve it. It has nothing to do with jvmti

I guess we need to take this off line but I don't understand how such a large missunderstanding of requirements could exist.

This is likely not going to be acceptable to the bulk of the consuming products since secure access has been a basic feature for many releases.
Comment 5 jkubasta CLA 2007-05-23 16:27:29 EDT
For tomorrow's meeting, please let me know how much effort would be required in order to add support to the NewAC for Security in its native mode
Comment 6 Samson Wai CLA 2007-05-25 12:47:05 EDT
Here are the two enhancements used to implement new AC security:

https://bugs.eclipse.org/bugs/show_bug.cgi?id=74579
https://bugs.eclipse.org/bugs/show_bug.cgi?id=147117

Unfortunately these are buried in the big pile of "future" enhancements.
Comment 7 Guru Nagarajan CLA 2007-05-29 19:15:36 EDT
AC needs to support secure AC. 
Comment 8 Valentina Popescu CLA 2007-06-26 10:50:13 EDT
Guru, please add size estimates
Comment 9 Guru Nagarajan CLA 2007-06-27 11:17:24 EDT
Valentina, again the secure AC is part of the Platform.Communications component. The new AC does not support security natively. The JVMTI Agent like any other agent resides on the top of the communications infrastructure.
This has to be provided by Joanna and team.
Comment 10 Samson Wai CLA 2007-06-28 09:24:31 EDT
Hi Igor. Please update the sizing on this bug. Thanks.
Comment 11 Igor Alelekov CLA 2007-07-06 07:29:42 EDT
Created attachment 73190 [details]
patch

Hi Samson, could you please review the patch?
It fixes the defect Ali descibed in his use case - JVMTI profiling doesn't work with security enabled in Agent Controller (in its "backward compatibility layer").
To track implementation of AC security in its regular mode I opened enhancement request #195644
Comment 12 Samson Wai CLA 2007-07-09 11:40:40 EDT
Thanks Igor. The patch seems trivial. What is the behaviour seen by the client now? What is the use of "acPortRequestReply()" for?
Comment 13 Igor Alelekov CLA 2007-07-10 00:37:40 EDT
(In reply to comment #12)
> Thanks Igor. The patch seems trivial. What is the behaviour seen by the client
> now? What is the use of "acPortRequestReply()" for?

You know, AC has two network listeners - one for new and one for old clients.
If Backward Compatibility Layer (dedicated for old clients service) detects a call from new client it sends redirect request with appropriate port value.

With security enabled this redirect is not being sent. The patch fixes it.
Comment 14 Harm Sluiman CLA 2007-07-10 07:55:32 EDT
(In reply to comment #13)

> You know, AC has two network listeners - one for new and one for old clients.
> If Backward Compatibility Layer (dedicated for old clients service) detects a
> call from new client it sends redirect request with appropriate port value.
> With security enabled this redirect is not being sent. The patch fixes it.

This sounds like the right simple fix. It will need testing via several scenarios to ensure everything works.
Comment 15 Samson Wai CLA 2007-07-10 09:38:50 EDT
Hi Igor. Please request for approval once you have completed your testing. Thanks.
Comment 16 Guru Nagarajan CLA 2007-07-10 09:59:10 EDT
Igor
 Looking at the patch - you are messaging to have the secureAC port responded back to the client. Does the Client then connect without security to the "New Secure Port"? There is no code in the execution framework to do this - the last time I checked.
Comment 17 Igor Alelekov CLA 2007-07-10 10:07:28 EDT
(In reply to comment #16)
> Igor
>  Looking at the patch - you are messaging to have the secureAC port responded
> back to the client. Does the Client then connect without security to the "New
> Secure Port"? There is no code in the execution framework to do this - the last
> time I checked.

No, the patch sends redirect to the configured insecure AC port (10006).
Clients connect to this port as usual and work without security as before.
Comment 18 Igor Alelekov CLA 2007-07-10 13:28:30 EDT
Hi Samson,
could you please check the patch in?
I've tested it on Windows and Linux.
Comment 19 Samson Wai CLA 2007-07-10 14:24:25 EDT
Hi Igor. The patch has been checked in. Please mark this bug as fixed. Thanks.
Comment 20 Igor Alelekov CLA 2007-07-10 15:16:03 EDT
Thanks, resolving as fixed.
Comment 21 Paul Slauenwhite CLA 2009-06-30 12:07:50 EDT
As of TPTP 4.6.0, TPTP is in maintenance mode and focusing on improving quality by resolving relevant enhancements/defects and increasing test coverage through test creation, automation, Build Verification Tests (BVTs), and expanded run-time execution. As part of the TPTP Bugzilla housecleaning process (see http://wiki.eclipse.org/Bugzilla_Housecleaning_Processes), this enhancement/defect is verified/closed by the Project Lead since this enhancement/defect has been resolved and unverified for more than 1 year and considered to be fixed. If this enhancement/defect is still unresolved and reproducible in the latest TPTP release (http://www.eclipse.org/tptp/home/downloads/), please re-open.