JDK-8192045 : Release Note: TLS Session Hash and Extended Master Secret Extension Support
  • Type: Sub-task
  • Component: security-libs
  • Sub-Component: javax.net.ssl
  • Affected Version: 6u191,7u171,8u161,9.0.4,10
  • Priority: P2
  • Status: Closed
  • Resolution: Delivered
  • Submitted: 2017-11-28
  • Updated: 2019-04-09
  • Resolved: 2018-01-21
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
JDK 10 JDK 6 JDK 7 JDK 8 JDK 9
10Resolved 6u191Resolved 7u171Resolved 8u161Resolved 9.0.4Resolved
Description
Support has been added for the TLS session hash and extended master secret extension (RFC 7627) in JDK JSSE provider.  Note that in general, a server certificate change is restricted if endpoint identification is not enabled and the previous handshake is a session-resumption abbreviated initial handshake, unless the identities represented by both certificates can be regarded as the same.  However, if the extension is enabled or negotiated, the server certificate changing restriction is not necessary and will be discarded accordingly.  In case of compatibility issues, an application may disable negotiation of this extension by setting the System Property `jdk.tls.useExtendedMasterSecret` to `false` in the JDK. By setting the System Property `jdk.tls.allowLegacyResumption` to `false`, an application can reject abbreviated handshaking when the session hash and extended master secret extension are not negotiated.  By setting the System Property `jdk.tls.allowLegacyMasterSecret` to `false`, an application can reject connections that do not support the session hash and extended master secret extension.