RFR: 8284105: Update security libraries to use sealed classes

2022-04-08 Thread Sean Mullan
Please review these changes to update the security libraries to use sealed classes. See JEP 409 for more details on sealed classes. No CSR is required as all the changes are to internal classes. A few classes that did not have subclasses were simply marked final instead of sealed.

Re: RFR: 8278080: Add --with-cacerts-src='user cacerts folder' to enable deterministic cacerts generation [v2]

2021-12-02 Thread Sean Mullan
On Thu, 2 Dec 2021 12:13:03 GMT, Andrew Leonard wrote: >> Addition of a configure option --with-cacerts-src='user cacerts folder' to >> allow developers to specify their own cacerts PEM folder for generation of >> the cacerts store using the deterministic openjdk GenerateCacerts tool. >> >>

Re: RFR: 8275252: Migrate cacerts from JKS to password-less PKCS12 [v2]

2021-10-19 Thread Sean Mullan
On Tue, 19 Oct 2021 19:48:23 GMT, Weijun Wang wrote: >> The cacerts file is now a password-less PKCS12 file. This make sure old code >> that uses a JKS KeyStore object can continuously load it using a null >> password (in fact, any password) and see all certificates inside. > > Weijun Wang has

Re: RFR: 8275252: Migrate cacerts from JKS to password-less PKCS12

2021-10-15 Thread Sean Mullan
On Thu, 14 Oct 2021 13:36:19 GMT, Weijun Wang wrote: > The cacerts file is now a password-less PKCS12 file. This make sure old code > that uses a JKS KeyStore object can continuously load it using a null > password (in fact, any password) and see all certificates inside.

Re: RFR: 8225083: Remove Google certificate that is expiring in December 2021

2021-08-17 Thread Sean Mullan
On Tue, 17 Aug 2021 03:59:15 GMT, Rajan Halade wrote: > Removed the expiring root certificate. Marked as reviewed by mullan (Reviewer). - PR: https://git.openjdk.java.net/jdk/pull/5137

Re: RFR: 8225082: Remove IdenTrust certificate that is expiring in September 2021

2021-07-26 Thread Sean Mullan
On Wed, 21 Jul 2021 02:02:06 GMT, Rajan Halade wrote: > This CA had no code signing certificates issued so it is safe to remove it > from cacerts truststore. Marked as reviewed by mullan (Reviewer). - PR: https://git.openjdk.java.net/jdk/pull/4851

Re: RFR: 8266459: Implement JEP 411: Deprecate the Security Manager for Removal [v3]

2021-05-23 Thread Sean Mullan
On Fri, 21 May 2021 15:27:39 GMT, Daniel Fuchs wrote: >> Weijun Wang has updated the pull request incrementally with one additional >> commit since the last revision: >> >> fixing awt/datatransfer/DataFlavor/DataFlavorRemoteTest.java > >

Re: RFR: 8266459: Implement JEP 411: Deprecate the Security Manager for Removal

2021-05-18 Thread Sean Mullan
On Tue, 18 May 2021 15:19:21 GMT, Alan Bateman wrote: >> It includes both: >> ![Screen Shot 2021-05-18 at 8 41 11 >> AM](https://user-images.githubusercontent.com/35072269/118652730-dfb35400-b7b4-11eb-83ee-92be9136fea2.jpg) > > Thanks for checking, I assumed that was the case so wondering if it

Re: RFR: 8266459: Implement JEP 411: Deprecate the Security Manager for Removal

2021-05-18 Thread Sean Mullan
On Tue, 18 May 2021 06:31:06 GMT, Alan Bateman wrote: >> Please review this implementation of [JEP >> 411](https://openjdk.java.net/jeps/411). >> >> The code change is divided into 3 commits. Please review them one by one. >> >> 1. >>

Re: RFR: 8253866: Security Libs Terminology Refresh

2021-01-14 Thread Sean Mullan
On Thu, 14 Jan 2021 06:32:37 GMT, Jamil Nimeh wrote: > This is the security libs portion of the effort to replace > archaic/non-inclusive words with more neutral terms (see JDK-8253315 for > details). > > Here are the changes covering core libraries code and tests. Terms were > changed as

RFR: 8243559: Remove root certificates with 1024-bit keys

2020-11-23 Thread Sean Mullan
This change removes five root certificates with 1024-bit RSA public keys from the system-wide `cacerts` keystore. These are older VeriSign and Thawte root CA certificates which are no longer necessary to retain and should have minimal compatibility risk if removed. See the CSR for more

Re: RFR: 8235710: Remove the legacy elliptic curves [v2]

2020-09-22 Thread Sean Mullan
On Tue, 22 Sep 2020 00:18:07 GMT, Anthony Scarpino wrote: >> This change removes the native elliptic curves library code; as well as, and >> calls to that code, tests, and files >> associated with those libraries. The makefiles have been changed to remove >> from all source builds of the ec

Re: [13] RFR: JDK-8225392: Comparison builds are failing due to cacerts file

2019-06-14 Thread Sean Mullan
On 6/14/19 11:33 AM, Weijun Wang wrote: Here is the updated webrev http://cr.openjdk.java.net/~weijun/8225392/webrev.01/ The only change is ordering in 'keytool -list' and its test. Looks fine. --Sean Thanks, Max On Jun 14, 2019, at 7:55 PM, Sean Mullan wrote: On 6/14/19 1:49 AM

Re: RFR: JDK-8225392: Comparison builds are failing due to cacerts file

2019-06-14 Thread Sean Mullan
On 6/14/19 1:49 AM, Weijun Wang wrote: BTW, something not related but similar: Do you like me to also sort aliases alphabetically in the output of "keytool -list"? Yes, I think that is useful. --Sean

Re: RFR: JDK-8225392: Comparison builds are failing due to cacerts file

2019-06-13 Thread Sean Mullan
It might be useful to run older versions of keytool against the cacerts binary you created - this would give you more assurance that your hand-coded format is correct. I would also try various commands, etc. --Sean Thanks, Max On Jun 13, 2019, at 4:15 AM, Sean Mullan wrote: On 6/12/19 4:0

Re: RFR: JDK-8225392: Comparison builds are failing due to cacerts file

2019-06-12 Thread Sean Mullan
Using the certificate's notBefore date as the KeyStore entry creation date is misleading since many of these root certs were not integrated into the JDK until after they were created by the CA. Can we somehow extract the last revision time of each PEM file instead? That is more aligned with

Re: RFR 8193255: Root Certificates should be stored in text format and assembled at build time

2019-05-31 Thread Sean Mullan
with instructions or a code snippet so that the next time we add a cert we know what to include at the top for consistency. Thanks, Sean Thanks, Max p.s. `keytool -printcert` shows validity in local timezone. Does not look good to me. On May 31, 2019, at 6:51 AM, Sean Mullan wrote: One

Re: RFR 8193255: Root Certificates should be stored in text format and assembled at build time

2019-05-30 Thread Sean Mullan
One suggestion is to put a printable form of the contents of the certificate at the top of each of the PEM files. It would be nice as a quick-look to see what is in the certificate. Of course, you can also use keytool -printcert to do that, but if I am just perusing the source code via a

Re: RFR 8189131: Open-source the Oracle JDK Root Certificates

2017-12-05 Thread Sean Mullan
On 12/5/17 12:01 PM, Volker Simonis wrote: Hi Rajan, 'cacerts' is a binary file and I thought we have at least the convention in the OpenJDK project that we don't want to check in binary artefact's if possible. One problem with 'cacerts' being a binary file is that we can not add a license and

Re: RFR: JDK-8159544: Remove deprecated classes in com.sun.security.auth.**

2017-08-18 Thread Sean Mullan
.01/ --Sean Thanks, Jan On 17.8.2017 21:08, Sean Mullan wrote: Please review this JDK 10 change to remove the deprecated classes in com.sun.security.auth.** that have been previously marked with forRemoval=true in JDK 9. webrev: http://cr.openjdk.java.net/~mullan/webrevs/8159544/ I have

Re: RFR: JDK-8159544: Remove deprecated classes in com.sun.security.auth.**

2017-08-18 Thread Sean Mullan
On Aug 18, 2017, at 3:08 AM, Sean Mullan <sean.mul...@oracle.com> wrote: Please review this JDK 10 change to remove the deprecated classes in com.sun.security.auth.** that have been previously marked with forRemoval=true in JDK 9. webrev: http://cr.openjdk.java.net/~mullan/webrevs/81595

Re: CSR Review for 8159544: Remove deprecated classes in com.sun.security.auth.**

2017-08-16 Thread Sean Mullan
ean Thanks Max On Aug 10, 2017, at 3:15 AM, Sean Mullan <sean.mul...@oracle.com> wrote: Max, Could you please review the following CSR: https://bugs.openjdk.java.net/browse/JDK-8186047 Thanks, Sean

Re: some config files out of conf directory

2017-08-04 Thread Sean Mullan
On 8/4/17 11:12 AM, Alan Bateman wrote: On 04/08/2017 07:59, Jiri Vanek wrote: Hello! I'm packaging openjdk9 for Fedora, and following files: jdk/lib/security/blacklisted.certs jdk/lib/security/default.policy Seems to be config files. Still, they are in lib/security, whether all other

Re: RFR: JDK-8178278 Move Standard Algorithm Names document to specs directory

2017-05-05 Thread Sean Mullan
General: change the text of all of the links from "Java Cryptography Architecture Standard Algorithm Name Documentation" (the old name) to "Java Security Standard Algorithm Names Specification". Looks good otherwise. Thanks, Sean On 5/5/17 9:17 AM, Magnus Ihse Bursie wrote: The Security

Re: RFR: 8164071: Default.policy file missing content for solaris

2016-08-17 Thread Sean Mullan
/default.policy endif Thanks. However, shouldn't that be "ifeq" and not "ifneq"? --Sean /Erik On 2016-08-17 18:18, Sean Mullan wrote: Please review this simple fix to append the solaris default.policy file to the overall default.policy file. Bug: https://bugs.openjdk.java.ne

RFR: 8164071: Default.policy file missing content for solaris

2016-08-17 Thread Sean Mullan
Please review this simple fix to append the solaris default.policy file to the overall default.policy file. Bug: https://bugs.openjdk.java.net/browse/JDK-8164071 diff -r 551f7617b2c0 make/copy/Copy-java.base.gmk --- a/make/copy/Copy-java.base.gmk Wed Aug 17 10:08:18 2016 +0800 +++

Re: RFR 8162739: Create new keytool option to access cacerts file

2016-08-09 Thread Sean Mullan
- src/java.base/share/classes/sun/security/tools/keytool/Resources.java 131 "operates on the cacerts keystore"}, // -cacerts "operates" sounds a little odd. How about "access the cacerts keystore" (so it is consistent with the warning below). 133 "Warning: use

Re: RFR: 8159752: Grant de-privileged module permissions by default with java.security.policy override option

2016-07-15 Thread Sean Mullan
Adding build-dev for review since there is one change to a Makefile in the webrev below. Thanks, Sean On 07/14/2016 04:05 PM, Sean Mullan wrote: Please review this change to the default Policy provider implementation to grant de-privileged module permissions by default even when

Re: RFR 8141690: JDK-8133151 change to MakeJavaSecurity.java is not complete

2015-12-01 Thread Sean Mullan
Weijun wrote: On Nov 25, 2015, at 11:04 PM, Sean Mullan <sean.mul...@oracle.com> wrote: The fix looks fine to me. For testing, can you create a test that uses a custom java.security file with "#ifndef solaris-sparc" in it, and check whether the property is used or not dependin

Re: RFR 8141690: JDK-8133151 change to MakeJavaSecurity.java is not complete

2015-11-25 Thread Sean Mullan
The fix looks fine to me. For testing, can you create a test that uses a custom java.security file with "#ifndef solaris-sparc" in it, and check whether the property is used or not depending on what system is being tested? --Sean On 11/24/2015 06:10 AM, Magnus Ihse Bursie wrote: On

Re: [9] RFR 8086002: Move apple.security.AppleProvider to a proper module

2015-08-14 Thread Sean Mullan
Couple of minor comments on ProviderConfig.java 183: you can use the diamond operator for anonymous classes now (PrivilegedAction). You could also use a lambda expression here but I'll leave that up to you. 193: the braces around if (debug != null) are not indented properly Looks fine

Re: RFR 6997010: Consolidate java.security files into one file with modifications

2014-08-05 Thread Sean Mullan
, Wang Weijun weijun.w...@oracle.com wrote: On Jul 25, 2014, at 22:30, Sean Mullan sean.mul...@oracle.com wrote: http://cr.openjdk.java.net/~weijun/6997010/webrev.00/ 4. *IMPORTANT*: In order to easily maintain platform-related entries, every line (including the last line) in package.access

Re: RFR 6997010: Consolidate java.security files into one file with modifications

2014-07-25 Thread Sean Mullan
On 07/22/2014 10:28 PM, Wang Weijun wrote: Please review the code change at http://cr.openjdk.java.net/~weijun/6997010/webrev.00/ The fix consolidates java.security-platform files into one with #ifdef directives. There are several major changes: 1. Creation of file is moved from CopyFiles

Re: RFR 8047765: Generate blacklist.certs in build

2014-07-02 Thread Sean Mullan
On 07/02/2014 01:02 AM, Wang Weijun wrote: On Jul 2, 2014, at 12:48, David Holmes david.hol...@oracle.com wrote: 73 // Output sorted for eye pleasure. ?? eye pleasure Well, it's easy for a human to locate one from a sorted output. Or maybe it's because the old one is sorted and I

Re: J2SE est mort, vive Java SE!

2013-12-05 Thread Sean Mullan
On 12/02/2013 05:05 PM, Sean Mullan wrote: What I am not 100% sure is whether the 'j2' in those library names is from Java 2. The 2 simply could have been a way to avoid naming clashes. IBM's JDK includes a pkcs11 library named libjpkcs11.so. Also, pkcs11 support and the libj2pkcs11.so library

Re: J2SE est mort, vive Java SE!

2013-12-02 Thread Sean Mullan
On 11/29/2013 06:47 PM, Omair Majid wrote: * Sean Mullan sean.mul...@oracle.com [2013-11-27 12:16]: On 11/27/2013 10:46 AM, Wang Weijun wrote: What security libs have j2 in their names? libj2gss.so etc. Any idea what the compatibility risk of removing the 2 would be? This seems less

Re: J2SE est mort, vive Java SE!

2013-12-02 Thread Sean Mullan
On 12/02/2013 04:50 PM, Phil Race wrote: On 12/2/2013 1:28 PM, Sean Mullan wrote: 'j' sounds reasonable to me. However, I'm not really sure if the 'j2' here is from 'j2se', 'j2re', or 'j2sdk', I would have to ask some developers who did the original implementation. It could have been simply

Re: J2SE est mort, vive Java SE!

2013-11-27 Thread Sean Mullan
On 11/27/2013 03:41 AM, Alan Bateman wrote: On 27/11/2013 00:29, David Holmes wrote: On 27/11/2013 8:49 AM, mark.reinh...@oracle.com wrote: Now that we've removed the old build system, can we please now remove the last vestiges of Sun's pre-Java 5 naming scheme? There are also a bunch of

Re: J2SE est mort, vive Java SE!

2013-11-27 Thread Sean Mullan
On 11/27/2013 10:46 AM, Wang Weijun wrote: What security libs have j2 in their names? libj2gss.so etc. Any idea what the compatibility risk of removing the 2 would be? This seems less prominent because it doesn't say j2se, j2re or j2sdk but I think it would be fine to rename these if

Re: [8] Review Request for 8007292 : Add JavaFX internal packages to package.access

2013-10-10 Thread Sean Mullan
On 10/10/2013 05:57 AM, Erik Joelsson wrote: Adding makefiles to make/tools is not needed for the new build. Either remove those changes or make a complete port to the old build. I'm not pushing for porting this to the old build at this point since missing this will not cause the old build to

Re: [8] Review Request for 8007292 : Add JavaFX internal packages to package.access

2013-10-09 Thread Sean Mullan
On 10/09/2013 05:14 AM, Erik Joelsson wrote: Hello Sean, On 2013-10-09 06:33, David Holmes wrote: Hi Sean, Not a full review. On 9/10/2013 5:52 AM, Sean Mullan wrote: Please review the fix for the following bug: https://bugs.openjdk.java.net/browse/JDK-8007292 This bug requires build

Re: [8] Review Request for 8007292 : Add JavaFX internal packages to package.access

2013-10-09 Thread Sean Mullan
Updated webrev: http://cr.openjdk.java.net/~mullan/webrevs/8007292/webrev.01/ Let me know if there are any more comments, otherwise I will plan to push tomorrow. Thanks, Sean On 10/09/2013 09:20 AM, Sean Mullan wrote: On 10/09/2013 05:14 AM, Erik Joelsson wrote: Hello Sean, On 2013-10-09

[8] Review Request for 8007292 : Add JavaFX internal packages to package.access

2013-10-08 Thread Sean Mullan
Please review the fix for the following bug: https://bugs.openjdk.java.net/browse/JDK-8007292 This bug requires build changes and a new build tool to add additional restricted packages to the java.security file which are not part of OpenJDK. These packages are only added when doing a build

Re: webrev.01 of 8011402: Move blacklisting certificate logic from hard code to data

2013-09-18 Thread Sean Mullan
On 09/17/2013 07:07 AM, Weijun Wang wrote: Webrev updated to version 02 at http://cr.openjdk.java.net/~weijun/8011402/webrev.02/ Changes since webrev.01: 1. Makefiles: - new build logic outside ifndef OPENJDK - Add a sed check to make sure open and close list use same algorithm 2.

Re: webrev.01 of 8011402: Move blacklisting certificate logic from hard code to data

2013-09-12 Thread Sean Mullan
Ok, I suggested you use a WeakHashMap but now I'm a little concerned this could become a bottleneck if every certificate check has to lock the map. Hmm. Maybe we should go back to the previous code, that also had some concurrency issues but it was only per certificate, and wasn't too bad

Re: Code review request: 8011402: Move blacklisting certificate logic from hard code to data

2013-09-06 Thread Sean Mullan
On 09/06/2013 09:30 AM, Weijun Wang wrote: Hi Sean Please review the code changes at 8011402: Move blacklisting certificate logic from hard code to data Hard coded blacklisted certificates are moved out of the class file and now inside a data file. Furthermore, only their fingerprints are