RE: [11u] RFR: 8226374: Restrict TLS signature schemes and named groups

2021-04-07 Thread Langer, Christoph
ttwoch, 7. April 2021 23:42 > To: Doerr, Martin ; jdk-updates-dev d...@openjdk.java.net>; security-dev > Cc: Lindenmaier, Goetz ; Langer, Christoph > > Subject: Re: [11u] RFR: 8226374: Restrict TLS signature schemes and named > groups > > The backport looks fine, except t

RE: [11u] RFR: 8254631: Better support ALPN byte wire values in SunJSSE

2021-04-01 Thread Langer, Christoph
Hi Martin, looks good to me. Best regards Christoph From: Doerr, Martin Sent: Dienstag, 30. März 2021 14:01 To: jdk-updates-dev ; security-dev Cc: Langer, Christoph Subject: [11u] RFR: 8254631: Better support ALPN byte wire values in SunJSSE Hi, JDK-8254631 is backported to 11.0.12-oracle

RE: [11u] RFR: 8206925: Support the certificate_authorities extension

2021-03-24 Thread Langer, Christoph
g, 23. März 2021 16:25 To: jdk-updates-...@openjdk.java.net; security-dev Cc: Lindenmaier, Goetz ; Langer, Christoph Subject: [11u] RFR: 8206925: Support the certificate_authorities extension Hi, JDK-8206925 was backported to 11.0.10-oracle, but it’s still missing in the Open Source vers

RE: [11u] RFR: 8256421: Add 2 HARICA roots to cacerts truststore

2021-02-18 Thread Langer, Christoph
Hi Martin, this backport looks good to me. Best regards Christoph From: Doerr, Martin Sent: Donnerstag, 18. Februar 2021 12:11 To: security-dev ; jdk-updates-...@openjdk.java.net Cc: Langer, Christoph ; Lindenmaier, Goetz Subject: [11u] RFR: 8256421: Add 2 HARICA roots to cacerts truststore

RE: RFR [XS]: 8239457: call ReleaseStringUTFChars before early returns in Java_sun_security_pkcs11_wrapper_PKCS11_connect

2020-02-21 Thread Langer, Christoph
Hi Matthias, this looks correct. Thanks for taking care of it. Best regards Christoph From: Baesken, Matthias Sent: Freitag, 21. Februar 2020 13:18 To: security-dev@openjdk.java.net Cc: Langer, Christoph Subject: RE: RFR [XS]: 8239457: call ReleaseStringUTFChars before early returns in

RE: RFR [XS]: 8239333: test/jdk/security/infra/java/security/cert/CertPathValidator/certification/AmazonCA.java fails intermittent

2020-02-18 Thread Langer, Christoph
Hi Matthias, this makes sense. Change looks fine. Thanks for doing it. Cheers Christoph From: security-dev On Behalf Of Baesken, Matthias Sent: Dienstag, 18. Februar 2020 10:56 To: security-dev@openjdk.java.net Subject: [CAUTION] RFR [XS]: 8239333: test/jdk/security/infra/java/security/cert/C

RE: RFR: 8225128: Add exception for expiring DocuSign root to VerifyCACerts test

2020-02-16 Thread Langer, Christoph
Hi Rajan, looks good. Thanks for doing this. Best regards Christoph From: security-dev On Behalf Of Rajan Halade Sent: Freitag, 14. Februar 2020 22:15 To: security-dev@openjdk.java.net Subject: RFR: 8225128: Add exception for expiring DocuSign root to VerifyCACerts test May I request you to

RE: RFR: 8237962: give better error output for invalid OCSP response intervals in CertPathValidator checks

2020-01-30 Thread Langer, Christoph
ption( "TEST FAILED: couldn't determine EE certificate status", cvpe); Best regards Christoph > -Original Message- > From: Baesken, Matthias > Sent: Donnerstag, 30. Januar 2020 09:25 > To: Sean Mullan ; security- > d...@openjdk.java.net > Cc:

RE: [CAUTION] RFR [XS]: 8237869: exclude jtreg test security/infra/java/security/cert/CertPathValidator/certification/LuxTrustCA.java because of instabilities - was : RE: jtreg test security/infra/jav

2020-01-27 Thread Langer, Christoph
uar 2020 17:13 > To: Baesken, Matthias ; Langer, Christoph > ; security-dev@openjdk.java.net > Subject: Re: [CAUTION] RFR [XS]: 8237869: exclude jtreg test > security/infra/java/security/cert/CertPathValidator/certification/LuxTrustCA. > java because of instabilities - was : RE: jtreg t

RE: [CAUTION] RFR [XS]: 8237869: exclude jtreg test security/infra/java/security/cert/CertPathValidator/certification/LuxTrustCA.java because of instabilities - was : RE: jtreg test security/infra/jav

2020-01-27 Thread Langer, Christoph
Hi Matthias, the entry in ProblemList.txt can't refer to 8237869, which is the bug that you're using to submit the exclusion. It must refer to the item that shall resolve the underlying issue which probably is Oracle's private bug that Sean referred to. @Sean: In the interest of backportabilit

RE: [11u] RFR: 8213010: Supporting keys created with certmgr.exe

2019-12-23 Thread Langer, Christoph
Hi Goetz, this looks good to me. I compared security.cpp after I've applied your changes to the version in jdk/jdk and there are only the changes missing that come with newer changes JDK-8223003 and JDK-8223063. Thanks for backporting this. Cheers Christoph > -Original Message- > From

RE: [8u] RFR: 8232019: Add LuxTrust certificate updates to the existing root program

2019-12-19 Thread Langer, Christoph
Hi, Just FWIW: JDK-8234245 fixed an issue where a wrong checksum was used in the test update that came with JDK-8232019. So, both can probably marked fixed with one change (e.g. adding both bugs to the submit message...) Cheers Christoph > -Original Message- > From: jdk8u-dev On Behal

RE: [8u] RFR: 8233223: Add Amazon Root CA certificates

2019-12-19 Thread Langer, Christoph
Hi Severin, same here, looks good - when VerifyCACerts passes, everything is correct. Cheers Christoph > -Original Message- > From: security-dev On Behalf Of > Severin Gehwolf > Sent: Donnerstag, 19. Dezember 2019 11:10 > To: Volker Simonis > Cc: jdk8u-dev ; security-dev d...@openjdk.

RE: [8u] RFR: 8232019: Add LuxTrust certificate updates to the existing root program

2019-12-19 Thread Langer, Christoph
Hi Severin, this looks good - when VerifyCACerts passes, everything is correct. We shall definitely try to backport "JDK-8193255: Root Certificates should be stored in text format and assembled at build time" somehow, to have easier certificate backports. Cheers Christoph > -Original Mess

RE: RFR(S): 8220348: [ntintel] asserts about copying unalinged array

2019-12-06 Thread Langer, Christoph
Hi Martin, ok, you are the author – so I won’t insist. 😊 Best regards Christoph From: Doerr, Martin Sent: Freitag, 6. Dezember 2019 12:22 To: Langer, Christoph Cc: core-libs-...@openjdk.java.net; security-dev ; Lindenmaier, Goetz ; Thomas Stüfe Subject: RE: RFR(S): 8220348: [ntintel

RE: RFR(S): 8220348: [ntintel] asserts about copying unalinged array

2019-12-05 Thread Langer, Christoph
; Langer, Christoph Cc: core-libs-...@openjdk.java.net; security-dev ; Lindenmaier, Goetz Subject: RE: RFR(S): 8220348: [ntintel] asserts about copying unalinged array Hi Thomas and Christoph, thanks for the reviews. Other code in java.security.jgss also uses these #defined checks: src

RE: RFR(S): 8220348: [ntintel] asserts about copying unalinged array

2019-12-04 Thread Langer, Christoph
Hi Martin, thanks for looking into this and coming up with this patch. The test failures were quite annoying 😊 In hotspot, there is coding to define a macro "ATTRIBUTE_ALIGNED(x)". I'd rather like to see that we define such a macro in the JDK code as well and use it. I think it would make the

RE: RFR 8233946: Add @since 13 annotation to KerberosPrincipal.KRB_NT_ENTERPRISE field

2019-11-12 Thread Langer, Christoph
Hi Martin, looks good. Best regards Christoph > -Original Message- > From: security-dev On Behalf Of > Martin Balao > Sent: Montag, 11. November 2019 23:35 > To: security-dev ; Sean Mullan > > Subject: RFR 8233946: Add @since 13 annotation to > KerberosPrincipal.KRB_NT_ENTERPRISE field

RE: CSR Review request (11-pool): JDK-8233825: Update SunPKCS11 provider with PKCS11 v2.40 support

2019-11-08 Thread Langer, Christoph
That's great, thanks Sean. I'll take care of backporting the other items as well. /Christoph From: Seán Coffey Sent: Freitag, 8. November 2019 17:03 To: Langer, Christoph ; Sean Mullan ; Valerie Peng ; OpenJDK Dev list Cc: Joe Darcy ; jdk-updates-...@openjdk.java.net Subject: Re:

CSR Review request (11-pool): JDK-8233825: Update SunPKCS11 provider with PKCS11 v2.40 support

2019-11-07 Thread Langer, Christoph
Hi Valerie, Sean, may I please ask you to add yourself as reviewer to the backport CSR JDK-8233825: "Update SunPKCS11 provider with PKCS11 v2.40 support" [0]. It is a CSR for backporting JDK-8080462 to OpenJKD 11u. Oracle did that already for 11.0.6 but with the internal ccc process. Joe indica

RE: [11u] RFR 8215032: Support Kerberos cross-realm referrals (RFC 6806)

2019-10-30 Thread Langer, Christoph
essage- > From: Martin Balao > Sent: Montag, 21. Oktober 2019 22:56 > To: Langer, Christoph ; jdk-updates- > d...@openjdk.java.net > Subject: Re: [11u] RFR 8215032: Support Kerberos cross-realm referrals (RFC > 6806) > > Hi Christoph, > > Can you please have a lo

RE: RFR: 8231887: ComodoCA.java fails because certificate was revoked

2019-10-09 Thread Langer, Christoph
+1 Thanks, Christoph > -Original Message- > From: Sean Mullan > Sent: Mittwoch, 9. Oktober 2019 20:58 > To: Rajan Halade ; security- > d...@openjdk.java.net > Cc: Langer, Christoph > Subject: Re: RFR: 8231887: ComodoCA.java fails because certificate was > rev

RE: Re: RFR [XS] 8231357: sun/security/pkcs11/Cipher/TestKATForGCM.java fails on SLES11 using mozilla-nss-3.14

2019-09-25 Thread Langer, Christoph
: Valerie Peng ; security-dev@openjdk.java.net Cc: Langer, Christoph Subject: RE: Re: RFR [XS] 8231357: sun/security/pkcs11/Cipher/TestKATForGCM.java fails on SLES11 using mozilla-nss-3.14 Hi Valerie / Christoph , New webrev : http://cr.openjdk.java.net/~mbaesken/webrevs/8231357.2

RE: RFR [XS] 8231357: sun/security/pkcs11/Cipher/TestKATForGCM.java fails on SLES11 using mozilla-nss-3.14

2019-09-24 Thread Langer, Christoph
Hi Matthias, looks good to me. One minor style nit: You could close the else case in line 335 with "}" and then have just one throw e; after the whole if else block. Best regards Christoph From: Baesken, Matthias Sent: Dienstag, 24. September 2019 10:30 To: Langer, Christoph ; se

RE: RFR: 8231222: fix pkcs11 P11_DEBUG guarded native traces

2019-09-23 Thread Langer, Christoph
Hi Matthias, your change looks good to me. Don't forget to update the copyright years before pushing. Best regards Christoph From: security-dev On Behalf Of Baesken, Matthias Sent: Donnerstag, 19. September 2019 16:28 To: security-dev@openjdk.java.net Subject: [CAUTION] RFR: 8231222: f

RE: RFR [XS] 8231357: sun/security/pkcs11/Cipher/TestKATForGCM.java fails on SLES11 using mozilla-nss-3.14

2019-09-23 Thread Langer, Christoph
mport javax.crypto.spec.GCMParameterSpec; import javax.crypto.spec.SecretKeySpec; Thanks Christoph From: Baesken, Matthias Sent: Montag, 23. September 2019 15:16 To: security-dev@openjdk.java.net Cc: Langer, Christoph ; Zeller, Arno Subject: RFR [XS] 8231357: sun/security/pkcs11/Cipher/T

RE: [11u] RFR: 8204203: Many pkcs11 tests failed in Provider initialization, after compiler on Windows changed

2019-09-06 Thread Langer, Christoph
again. Thanks Christoph From: Langer, Christoph Sent: Mittwoch, 4. September 2019 17:00 To: Baesken, Matthias ; security-dev@openjdk.java.net; jdk-updates-...@openjdk.java.net; Aleksey Shipilev Subject: RE: [11u] RFR: 8204203: Many pkcs11 tests failed in Provider initialization, after compiler

RE: [11u] RFR: 8204203: Many pkcs11 tests failed in Provider initialization, after compiler on Windows changed

2019-09-04 Thread Langer, Christoph
nks Christoph From: Baesken, Matthias Sent: Mittwoch, 4. September 2019 16:54 To: Langer, Christoph ; security-dev@openjdk.java.net; jdk-updates-...@openjdk.java.net Subject: RE: [11u] RFR: 8204203: Many pkcs11 tests failed in Provider initialization, after compiler on Windows changed Hello Christ

[11u] RFR: 8204203: Many pkcs11 tests failed in Provider initialization, after compiler on Windows changed

2019-09-03 Thread Langer, Christoph
Hi, please review the backport of this testfix to JDK11 updates. Bug: https://bugs.openjdk.java.net/browse/JDK-8204203 Original Change: http://hg.openjdk.java.net/jdk/jdk/rev/251090f84412 Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8204203.11u.0/ The backport differs in that sun/security

[11u] RFR(XS): 8224991: Problemlist javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java

2019-08-09 Thread Langer, Christoph
Hi, please review the problemlisting of javax/net/ssl/ServerName/SSLEngineExplorerMatchedSNI.java in jdk11u. There's an issue with the test, tracked by JDK-8212096. We see this issue in 11u testing, too. In jdk/jdk resp. jdk/jdk13, the test is excluded, so I think we should exclude it in 11u a

RE: [11u] RFR: 8216039: TLS with BC and RSASSA-PSS breaks ECDHServerKeyExchange

2019-07-11 Thread Langer, Christoph
Ping... Can somebody please have a look at this backport? Regression testing shows no problems... Thanks Christoph From: Langer, Christoph Sent: Donnerstag, 4. Juli 2019 15:11 To: jdk-updates-...@openjdk.java.net Cc: security-dev Subject: [11u] RFR: 8216039: TLS with BC and RSASSA-PSS breaks

RE: [11u] RFR: 8216039: TLS with BC and RSASSA-PSS breaks ECDHServerKeyExchange

2019-07-11 Thread Langer, Christoph
Ping... would somebody please eyeball this backport? No regressions seen in testing... Thanks Christoph From: Langer, Christoph Sent: Donnerstag, 4. Juli 2019 15:11 To: jdk-updates-...@openjdk.java.net Cc: security-dev Subject: [11u] RFR: 8216039: TLS with BC and RSASSA-PSS breaks

[11u] RFR: 8216039: TLS with BC and RSASSA-PSS breaks ECDHServerKeyExchange

2019-07-04 Thread Langer, Christoph
Hi, please help reviewing the backport of JDK-8216039 to jdk11u-dev. Since predecessor patch JDK-8211122 could not be applied to JDK 11 updates, some manual work is necessary. In src/java.base/share/classes/java/security/Signature.java and src/java.base/share/classes/sun/security/util/Signatur

RE: [11u]: RFR: Backport of 8215694: keytool cannot generate RSASSA-PSS certificates

2019-07-01 Thread Langer, Christoph
Hi Paul, thanks for your review. > In CertAndKeyGen.java, does generate() need a throws declaration? It doesn't. IllegalArgumentException is a RuntimeException and as such doesn't need a throws declaration. And InvalidKeyException is obviously not needed and was removed in the original changes

RE: [11u]: RFR: Backport of 8215694: keytool cannot generate RSASSA-PSS certificates

2019-06-28 Thread Langer, Christoph
; -Original Message- > From: jdk-updates-dev On > Behalf Of Langer, Christoph > Sent: Mittwoch, 26. Juni 2019 17:30 > To: jdk-updates-...@openjdk.java.net > Cc: security-dev > Subject: [CAUTION] [11u]: RFR: Backport of 8215694: keytool cannot > generate RSASSA-PSS certific

[11u] RFR (S): 8226880: Backport of JDK-8208698 (Improved ECC Implementation) should not bring parts of JDK-8205476 (KeyAgreement#generateSecret is not reset for ECDH based algorithm)

2019-06-27 Thread Langer, Christoph
Hi, I made a mistake when bringing JDK-8226880 to 11u. The patch introduced coding of JDK-8205476 that should not be there. Here is a patch to fix this. Bug: https://bugs.openjdk.java.net/browse/JDK-8226880 Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8226880.11u.0/ As the backport is in

RE: [11u] RFR: 8208698: Improved ECC Implementation

2019-06-27 Thread Langer, Christoph
level assert but maybe we'll need to take some (backout?) action here for 11.0.4, too... Thanks Christoph > -Original Message- > From: Andrew John Hughes > Sent: Donnerstag, 27. Juni 2019 06:09 > To: Langer, Christoph ; jdk-updates- > d...@openjdk.java.net >

[11u]: RFR: Backport of 8215694: keytool cannot generate RSASSA-PSS certificates

2019-06-26 Thread Langer, Christoph
Hi, please help reviewing the backport of JDK- 8215694: keytool cannot generate RSASSA-PSS certificates. The patch doesn't apply cleanly but the rejects are only minor. The Item is needed as prerequisite to apply JDK-8216039. Bug: https://bugs.openjdk.java.net/browse/JDK-8215694 Original Change

RE: OpenJDK 11u backport of JDK-8148188: Enhance the security libraries to record events of interest

2019-06-22 Thread Langer, Christoph
; To: Langer, Christoph ; jdk-updates- > d...@openjdk.java.net; security-dev > Subject: Re: OpenJDK 11u backport of JDK-8148188: Enhance the security > libraries to record events of interest > > Hi Christoph, > > On 22/06/2019 2:25 pm, Langer, Christoph wrote: > > H

OpenJDK 11u backport of JDK-8148188: Enhance the security libraries to record events of interest

2019-06-22 Thread Langer, Christoph
Hi, I pushed the backport of JDK-8148188 [0] to jdk11u-dev [1] on Friday. I was wondering why no 11.0.5 backport JBS item was created. I then manually created JDK-8226636 [2], but the minute I had created it I got an idea what the reason for that strange JBS/hgupdater behavior was (all other pu

RE: [11u] RFR: 8208698: Improved ECC Implementation

2019-05-31 Thread Langer, Christoph
4:40 > To: Langer, Christoph ; jdk-updates- > d...@openjdk.java.net > Cc: security-dev > Subject: RE: [11u] RFR: 8208698: Improved ECC Implementation > > Hi Christoph, > > looks like quite some manual resolution just because of a small conflicting > change in one fil

RE: RFR CSR for 8162628: Migrating cacerts keystore to password-less PKCS12 format

2019-05-31 Thread Langer, Christoph
Hi Max, > But you changed > >everyone (yes, everyone) has been loading cacerts with a null password > and they are able to read all certificate inside. > > to > >everyone (yes, everyone) who loads cacerts with a null password is able to > read all certificates inside. > > I *did* mean

RE: RFR CSR for 8162628: Migrating cacerts keystore to password-less PKCS12 format

2019-05-31 Thread Langer, Christoph
Hi Max, I've already made some updates to the wording in the CSR. In the specification section, it should probably also not mention the source location src/java.base/share/lib/security/cacerts as it is about to be eliminated by JDK-8193255. It should rather refer to /lib/security/cacerts, I th

RE: RFR 8193255: Root Certificates should be stored in text format and assembled at build time

2019-05-31 Thread Langer, Christoph
Hi Max, this looks all good to me now :) Best regards Christoph > -Original Message- > From: build-dev On Behalf Of > Weijun Wang > Sent: Freitag, 31. Mai 2019 05:01 > To: Erik Joelsson > Cc: security-dev@openjdk.java.net; build-dev d...@openjdk.java.net> > Subject: Re: RFR 8193255: R

RE: RFR 8193255: Root Certificates should be stored in text format and assembled at build time

2019-05-30 Thread Langer, Christoph
Hi Max, first of all, thanks for doing this enhancement. That'll really help in the future when downstream vendors merge in additional certificates (or remove some) like we do with SapMachine. Currently we have to resolve manually everytime cacerts is modified. As for the dependencies: if you

RE: RFR(S): Cleanups in sun/security/provider/certpath/ldap/LDAPCertStoreImpl.java

2019-05-29 Thread Langer, Christoph
Hi Sean, thanks for the review. I've addressed your points: http://cr.openjdk.java.net/~clanger/webrevs/8224729.2/ Thanks Christoph > -Original Message- > From: Sean Mullan > Sent: Dienstag, 28. Mai 2019 15:18 > To: Langer, Christoph ; security-dev d...@openjdk.ja

[11u] RFR: 8208698: Improved ECC Implementation

2019-05-28 Thread Langer, Christoph
Hi, please review this backport of JDK-8208698: Improved ECC Implementation. Bug: https://bugs.openjdk.java.net/browse/JDK-8208698 Original Change: http://hg.openjdk.java.net/jdk/jdk/rev/752e57845ad2 Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8208698.11u/ The patch did not apply cleanly

RFR(S): Cleanups in sun/security/provider/certpath/ldap/LDAPCertStoreImpl.java

2019-05-25 Thread Langer, Christoph
Hi, please review this small cleanup which started off under a different subject [0] but turned out to be the wrong thing to do. Still the cleanup parts seem to be valuable, so requesting a review for that here. Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8224729.1/ Bug: https://bugs.op

RE: RFR(S): 8224729: sun/security/provider/certpath/ldap/LDAPCertStoreImpl.java can't handle forward slash characters in Certificate Issuer Names

2019-05-24 Thread Langer, Christoph
> > As for Bug JDK-8224729: Shall I just close the ticket, dropping a comment > about the ignorance of the author or shall I repurpose it to do the other > cleanups in LDAPCertStoreImpl.java that I suggested? Don't know if these > are appreciated... what do you think? > > Either way, the debugging

RE: RFR(S): 8224727: Problem list 2 tests in security/infra/java/security/cert/CertPathValidator/certification

2019-05-24 Thread Langer, Christoph
Hi Rajan, thanks for this. Problem list update would be then: http://cr.openjdk.java.net/~clanger/webrevs/8224727.1/ Please review. Thanks Christoph > -Original Message- > From: Rajan Halade > Sent: Freitag, 24. Mai 2019 18:52 > To: Langer, Christoph > Cc: Sean Mullan

RE: RFR(S): 8224729: sun/security/provider/certpath/ldap/LDAPCertStoreImpl.java can't handle forward slash characters in Certificate Issuer Names

2019-05-24 Thread Langer, Christoph
these are appreciated... what do you think? Best regards Christoph > -Original Message- > From: Sean Mullan > Sent: Freitag, 24. Mai 2019 14:02 > To: Langer, Christoph ; security-dev d...@openjdk.java.net> > Subject: Re: RFR(S): 8224729: > sun/

RFR(S): 8224729: sun/security/provider/certpath/ldap/LDAPCertStoreImpl.java can't handle forward slash characters in Certificate Issuer Names

2019-05-24 Thread Langer, Christoph
Hi, please review this fix for an issue that I've discovered when working with test security/infra/java/security/cert/CertPathValidator/certification/ActalisCA.java. It fails when the test tries to do the CRL verification of the certificate. It has issues in the LDAP implementation because of t

RFR(S): 8224727: Problem list 2 tests in security/infra/java/security/cert/CertPathValidator/certification

2019-05-24 Thread Langer, Christoph
Hi, please review the problem listing of security/infra/java/security/cert/CertPathValidator/certification/ActalisCA.java and security/infra/java/security/cert/CertPathValidator/certification/ComodoCA.java until JDK-8202651 and JDK-8215546 are resolved. Bug: https://bugs.openjdk.java.net/brows

RE: RFR: 8202651: Test ActalisCA.java and ComodoCA fails

2019-05-23 Thread Langer, Christoph
Hi Rajan, Sean, first of all, thanks for the update on the tests. As I see, there are still open questions for the ActalisCA test. So I'm wondering whether the fix for ComodoCA can be pushed as fix for https://bugs.openjdk.java.net/browse/JDK-8215546 ? Furthermore, can we also exclude the Acta

RE: [8u] RFR: 8189131: Open-source the Oracle JDK Root Certificates (Integration for JEP 319: Root Certificates)

2019-05-14 Thread Langer, Christoph
t system and have to exclude them locally. /Christoph > -Original Message- > From: Doerr, Martin > Sent: Dienstag, 14. Mai 2019 10:22 > To: Langer, Christoph ; 'jdk8u- > d...@openjdk.java.net' ; security-dev > > Subject: RE: [8u] RFR: 8189131: Open-source the Orac

RE: RFR(XS): 8223555: Cleanups in cacerts tests

2019-05-08 Thread Langer, Christoph
> Sent: Mittwoch, 8. Mai 2019 15:58 > To: Langer, Christoph ; security-dev d...@openjdk.java.net> > Subject: Re: RFR(XS): 8223555: Cleanups in cacerts tests > > Hi Christoph, > > Did you see compiler warning for the files? I tried with the JDK > repository build, no compile

RFR(XS): 8223555: Cleanups in cacerts tests

2019-05-08 Thread Langer, Christoph
Hi, please review this small change which contains a few minor cleanups to the tests for the CA certificates. I had it in my mercurial queue for quite some time and always wanted to contribute it 😊 Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8223555.0/ Bug: https://bugs.openjdk.java.net

RE: [8u] RFR: 8189131: Open-source the Oracle JDK Root Certificates (Integration for JEP 319: Root Certificates)

2019-05-07 Thread Langer, Christoph
Ping: can I please have a review for this? From: Langer, Christoph Sent: Donnerstag, 2. Mai 2019 14:55 To: 'jdk8u-...@openjdk.java.net' ; security-dev Subject: [8u] RFR: 8189131: Open-source the Oracle JDK Root Certificates (Integration for JEP 319: Root Certificates) Hi, as w

[8u] RFR: 8189131: Open-source the Oracle JDK Root Certificates (Integration for JEP 319: Root Certificates)

2019-05-02 Thread Langer, Christoph
Hi, as was already discussed and requested on the mailing lists ([0], [1]), I hereby propose a change to add the root certificates of upstream OpenJDK to OpenJDK 8 updates. The main bug that (initially) brought the Oracle certificates to OpenJDK is 8189131: Open-source the Oracle JDK Root Cert

RE: RFR: 8222137: Remove T-Systems root CA certificate

2019-05-02 Thread Langer, Christoph
Hi Sean, sounds good. I’ll create an 11.0.4 bug before pushing to jkd11u-dev. I assume you’ll take care of jdk12u? Thanks Christoph From: Seán Coffey Sent: Donnerstag, 2. Mai 2019 10:25 To: Langer, Christoph Cc: Rajan Halade ; Sean Mullan ; security-dev Subject: Re: RFR: 8222137: Remove T

RE: RFR: 8222137: Remove T-Systems root CA certificate

2019-05-02 Thread Langer, Christoph
: Langer, Christoph Cc: Sean Mullan ; security-dev ; Seán Coffey Subject: Re: RFR: 8222137: Remove T-Systems root CA certificate I have created needed backports including 12-pool, 11-pool, 8-pool, and 7-pool. These are assigned to Sean C. for now. Please co-ordinate with him. Thanks, Rajan On

RE: RFR: 8222137: Remove T-Systems root CA certificate

2019-05-01 Thread Langer, Christoph
Hi Rajan, I’ll take this to jdk11 updates. What about jdk12 updates? I can process both releases, if you want. Best regards Christoph From: security-dev On Behalf Of Rajan Halade Sent: Dienstag, 30. April 2019 20:39 To: Sean Mullan ; security-dev Subject: RFR: 8222137: Remove T-Systems root

RE: RFR [backport to jdk and 11u]: 8216577: Add GlobalSign's R6 Root certificate

2019-05-01 Thread Langer, Christoph
Thank you, Rajan. From: Rajan Halade Sent: Dienstag, 30. April 2019 20:08 To: Langer, Christoph Cc: security-dev@openjdk.java.net; jdk-updates-...@openjdk.java.net; Sean Mullan Subject: Re: RFR [backport to jdk and 11u]: 8216577: Add GlobalSign's R6 Root certificate Thanks Christop

RE: Regarding JDK-8216577: Add GlobalSign's R6 Root certificate

2019-04-29 Thread Langer, Christoph
> >> It should be in 11.0.3-oracle. The backport issue is Confidential so > >> maybe that is why you thought it wasn't. > > Yep, that explains it. Any particular reason that the 11.0.3-oracle > > backport is > confidential? Could you make it public? Just asking... > > Fixed. Thanks! > >> JDK 13

RFR [backport to jdk and 11u]: 8216577: Add GlobalSign's R6 Root certificate

2019-04-29 Thread Langer, Christoph
Hi, the change to add GlobalSign's R6 Root certificate has only been pushed to jdk12 updates (12.0.1) so far. According to [0], it was an oversight to not have it added to jdk/jdk. I also want to bring it to 11u. Taking the change to both, jdk/jdk and jdk-updates/jdk11u-dev does not apply clea

RE: Regarding JDK-8216577: Add GlobalSign's R6 Root certificate

2019-04-26 Thread Langer, Christoph
> -Original Message- > From: Sean Mullan > Sent: Samstag, 27. April 2019 00:54 > To: Langer, Christoph ; security- > d...@openjdk.java.net; Rajan Halade > Subject: Re: Regarding JDK-8216577: Add GlobalSign's R6 Root certificate > > On 4/26/19 6:04 PM, La

Regarding JDK-8216577: Add GlobalSign's R6 Root certificate

2019-04-26 Thread Langer, Christoph
Hi, In JBS I can find the bug JDK-8216577: Add GlobalSign's R6 Root certificate [0]. This change has gone into 12.0.1 and also 12.0.2 but it's not part of JDK13 (jdk/jdk) and also not of JDK11 (e.g. 11.0.3-oracle, 11.0.4-oracle). Could you please shed some light into this unusual proceeding? Us

RE: RFR(xxs): 8221407: Windows 32bit build error in libsunmscapi/security.cpp

2019-03-26 Thread Langer, Christoph
Hi Thomas, looks good to me. Best regards Christoph From: security-dev On Behalf Of Thomas Stüfe Sent: Montag, 25. März 2019 14:13 To: security-dev@openjdk.java.net Subject: RFR(xxs): 8221407: Windows 32bit build error in libsunmscapi/security.cpp Hi all, please review this tiny fix to the

RE: [8u] Is it possible to bring root certificates to OpenJDK 8 [JEP319] ?

2019-03-25 Thread Langer, Christoph
ttps://github.com/AdoptOpenJDK/openjdk-build/tree/master/security From: Martijn Verburg Sent: Freitag, 22. März 2019 20:38 To: Sean Mullan Cc: Langer, Christoph ; jdk8u-...@openjdk.java.net; OpenJDK Dev list Subject: Re: [8u] Is it possible to bring root certificates to OpenJDK 8 [JEP319] ?

RE: [8u] Is it possible to bring root certificates to OpenJDK 8 [JEP319] ?

2019-03-24 Thread Langer, Christoph
Hi Sean, > > Now my questions are: Is it legally possible to bring these root > > certificates > also into OpenJDK 8? Since it is a JEP, can the “feature” be added to OpenJDK > 8 via an update release? And, last but not least, would there be interest in > the community for that at all? > > I can

[8u] Is it possible to bring root certificates to OpenJDK 8 [JEP319] ?

2019-03-21 Thread Langer, Christoph
Hi, I recently came across a scenario where I wanted to use a self-built OpenJDK 8 in a maven build and it could not download artefacts due to missing root certificates. I helped myself by replacing the cacerts with some other version from a later OpenJDK and came over the issue. However, I’ve

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-02-13 Thread Langer, Christoph
Hi Lance, thanks for the detailed explanation, sounds great. I’ll work that in in my next edition 😊 Best regards Christoph From: Lance Andersen Sent: Mittwoch, 13. Februar 2019 23:53 To: Langer, Christoph Cc: Alan Bateman ; nio-dev ; Java Core Libs ; OpenJDK Dev list ; Volker Simonis

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-02-13 Thread Langer, Christoph
Hi Lance, thanks for looking. > Just starting to take a peek at this and noticed one quick thing in your test: > > Paths.get(System.getProperty("test.dir", "."), "testPosix.zip") > —— > > You do not need the test.dir property  or the permission added to test.policy > to access i

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-02-12 Thread Langer, Christoph
. Module-info and CSR have been adopted, too. Thanks in advance for reviewing. Best regards Christoph > -Original Message- > From: Langer, Christoph > Sent: Montag, 21. Januar 2019 10:17 > To: 'Alan Bateman' > Cc: nio-dev ; OpenJDK Dev list d...@openjdk.java.net>; Java

RE: RFR [11u backport]: 8217579: TLS_EMPTY_RENEGOTIATION_INFO_SCSV is disabled after 8211883

2019-02-01 Thread Langer, Christoph
Thanks Sean. Pushed with the replacement as you suggested. > -Original Message- > From: Sean Mullan > Sent: Donnerstag, 31. Januar 2019 21:03 > To: Langer, Christoph ; security- > d...@openjdk.java.net > Subject: Re: RFR [11u backport]: 8217579: > TLS_EMPTY_RENEG

RFR [11u backport]: 8217579: TLS_EMPTY_RENEGOTIATION_INFO_SCSV is disabled after 8211883

2019-01-31 Thread Langer, Christoph
Hi, please review the backport of the fix for 8217579 to jdk11u. Bug: https://bugs.openjdk.java.net/browse/JDK-8217579 Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8217579.11u/ Original review thread: https://mail.openjdk.java.net/pipermail/security-dev/2019-January/019256.html The patch

RE: 8217579: TLS_EMPTY_RENEGOTIATION_INFO_SCSV is gone after 8211883

2019-01-28 Thread Langer, Christoph
Hi Sean, to me this looks fine. +1 The test should be really valuable in the future. Thanks & Best regards Christoph > -Original Message- > From: security-dev On Behalf Of > Sean Mullan > Sent: Montag, 28. Januar 2019 22:25 > To: security-dev@openjdk.java.net > Subject: Re: 8217579: TL

RE: RFR 8217657: Move the test for default value of jdk.includeInExceptions into own test

2019-01-24 Thread Langer, Christoph
Hi Sean, thanks for looking at this. I agree. Will remove othervm... Best regards Christoph > -Original Message- > From: Sean Mullan > Sent: Donnerstag, 24. Januar 2019 17:43 > To: Langer, Christoph ; OpenJDK Dev list > ; OpenJDK Network Dev list d...@openjdk.java.net

RE: RFR 8217657: Move the test for default value of jdk.includeInExceptions into own test

2019-01-24 Thread Langer, Christoph
Hi Goetz, thanks for the review. I've added the comment as you suggested: http://cr.openjdk.java.net/~clanger/webrevs/8217657.1/ Will run it through our nightly tests before submitting... /Christoph From: Lindenmaier, Goetz Sent: Donnerstag, 24. Januar 2019 08:48 To: Langer, Chri

RFR 8217657: Move the test for default value of jdk.includeInExceptions into own test

2019-01-23 Thread Langer, Christoph
Hi, please review a small test update. Bug: https://bugs.openjdk.java.net/browse/JDK-8217657 Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8217657.0/ I'd like to move the test for the correct default value of security property "jdk.includeInExceptions" into an own testcase in the jdk.secu

Shall TLS_EMPTY_RENEGOTIATION_INFO_SCSV really be disabled via jdk.tls.disabledAlgorithms=...,NULL or is it an unwanted side effect of JDK-8211883?

2019-01-22 Thread Langer, Christoph
Hi security experts, one of our customers is running into an issue with a Tomcat application after JDK-8211883 [1]. It seems that because of adding NULL to jdk.tls.disabledAlgorithms, the pseudo cipher suite TLS_EMPTY_RENEGOTIATION_INFO_SCSV is disabled. Seems like, according to CipherSuite.ja

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-01-21 Thread Langer, Christoph
Hi Alan, first of all, thank you for your input on this. > I think the approach to explore are: > > 1. zipfs supports PosixFileAttributeView without subsetting. If > readAttribute(file, BasicFileAttributes.class) succeeds then > readAttribute(file, PosixFileAttributes.class) should also succeed,

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-01-13 Thread Langer, Christoph
Hi Alan, > I will try to get time next week to reply to you on this. Part of the > issue with your current approach is that it breaks PosixFileAttribtues. > There are also issues trying to force the API to optionally support a > subset of POSIX attributes on some zip entries and not on others. So

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-01-13 Thread Langer, Christoph
into your work. Seeing how things are going with this POSIX permission topic, I’m sure you’ll be done with a patch for 8182117 much earlier than me 😉. Best Christoph From: Lance Andersen Sent: Samstag, 12. Januar 2019 15:01 To: Langer, Christoph Cc: Alan Bateman ; nio-dev ; OpenJDK Dev list

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-01-12 Thread Langer, Christoph
the zip file system provider can be accessed and new zip filesystems can be created. Please kindly review this. Thank you and best regards Christoph > -Original Message- > From: Langer, Christoph > Sent: Dienstag, 8. Januar 2019 09:27 > To: 'Alan Bateman' ; Volker S

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-01-08 Thread Langer, Christoph
his is the right way to go? Should we maybe do the spec update of the permission methods in a separate change? Best regards Christoph > -Original Message- > From: Alan Bateman > Sent: Montag, 7. Januar 2019 21:46 > To: Volker Simonis > Cc: Langer, Christoph ; nio-dev d...@o

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2019-01-07 Thread Langer, Christoph
://bugs.openjdk.java.net/browse/JDK-8213082 Please review both, CSR and changeset and let me know if this is good now or what else needs to be addressed. Thanks and best regards, Christoph From: Volker Simonis Sent: Freitag, 21. Dezember 2018 17:34 To: Langer, Christoph Cc: Java Core Libs

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2018-12-21 Thread Langer, Christoph
Hi all, here comes the updated webrev: http://cr.openjdk.java.net/~clanger/webrevs/8213031.3/ I've rebased the change to the current state of the JDK depot. Thanks to Volker, the test has been enhanced and now also tests more copy operations (from zip file system to zip file system and from zi

RE: RFR - CSR: 8213082: (zipfs) Add support for POSIX file permissions (was: Re: RFR 8213031: (zipfs) Add support for POSIX file permissions)

2018-12-21 Thread Langer, Christoph
Hi Alan, > Adding support for POSIX file permissions to the zip APIs is problematic > as we've been discussing here. There are security concerns and also > concerns that how it interacts with JAR files and signed JAR in > particular. I don't disagree that we can come to agreement on zipfs > suppor

RFR - CSR: 8213082: (zipfs) Add support for POSIX file permissions (was: Re: RFR 8213031: (zipfs) Add support for POSIX file permissions)

2018-12-21 Thread Langer, Christoph
> From: Chris Hegarty > Sent: Montag, 5. November 2018 17:19 > To: Langer, Christoph ; core-libs-dev d...@openjdk.java.net>; security-dev@openjdk.java.net; Xueming Shen > > Cc: nio-dev > Subject: Re: RFR 8213031: (zipfs) Add support for POSIX file permissions > > > On

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2018-11-05 Thread Langer, Christoph
Hi Chris > The reason I asked about the CSR scope clarification is that it was > unclear to me what the ultimate intentions are, given that the previous > mails ( linked to from the CSR ) did have Java SE API changes ( in the > java.util.zip package ). > > Are you now happy to reduce the scope of

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2018-11-05 Thread Langer, Christoph
lling to have a look from security perspective? Thanks & Best regards Christoph From: Alan Bateman Sent: Montag, 5. November 2018 11:23 To: Langer, Christoph ; core-libs-dev ; security-dev@openjdk.java.net; Xueming Shen Cc: Volker Simonis ; nio-dev Subject: Re: RFR 8213031: (zipfs) Add support f

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2018-11-05 Thread Langer, Christoph
rom: Chris Hegarty > Sent: Montag, 5. November 2018 13:20 > To: Langer, Christoph ; core-libs-dev d...@openjdk.java.net>; security-dev@openjdk.java.net > Cc: nio-dev > Subject: Re: RFR 8213031: (zipfs) Add support for POSIX file permissions > > Hi Christoph,

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions

2018-11-04 Thread Langer, Christoph
Hi, Ping. May I get reviews/substantial feedback on this zipfs enhancement? Bug: https://bugs.openjdk.java.net/browse/JDK-8213031 CSR: https://bugs.openjdk.java.net/browse/JDK-8213082 Webrev: http://cr.openjdk.java.net/~clanger/webrevs/8213031.2/ Thanks Christoph From: Langer, Christoph Sent

RE: RFR 8213031: (zipfs) Add support for POSIX file permissions (was: Enhance jdk.nio.zipfs to support Posix File Permissions)

2018-10-29 Thread Langer, Christoph
i/java.base/java/nio/file/attribute/PosixFileAttributeView.html Thanks in advance for reviewing. Best regards Christoph From: Alan Bateman Sent: Montag, 29. Oktober 2018 13:06 To: Langer, Christoph ; core-libs-dev ; security-dev@openjdk.java.net; Xueming Shen Cc: Volker Simonis ; Andrew Luo

RFR 8213031: (zipfs) Add support for POSIX file permissions (was: Enhance jdk.nio.zipfs to support Posix File Permissions)

2018-10-29 Thread Langer, Christoph
erspective. Thanks Christoph From: Langer, Christoph Sent: Freitag, 26. Oktober 2018 17:13 To: core-libs-dev ; nio-dev ; 'Xueming Shen' Cc: Schmelter, Ralf ; 'Volker Simonis' Subject: RFR 8213031: Enhance jdk.nio.zipfs to support Posix File Permissions Hi, please review this e

RE: RFR: 8211752: JNU_ThrowIOExceptionWithLastErrorAndPath - enhance some IOExceptions with path causing the issue

2018-10-12 Thread Langer, Christoph
Hi Matthias, I generally support this enhancement of IOExceptions to include path information. I also think that we should protect this with the java.security property "jdk.includeInExceptions" and agree that "path" would be a good choice since it is generic enough to be used in other places w

RE: [RFR] 8205525 : Improve exception messages during manifest parsing of jar archives

2018-09-12 Thread Langer, Christoph
Looks good to me. > -Original Message- > From: Baesken, Matthias > Sent: Mittwoch, 12. September 2018 11:27 > To: Sean Mullan ; Langer, Christoph > ; Weijun Wang > Cc: security-dev@openjdk.java.net; core-libs-...@openjdk.java.net > Subject: RE: [RFR] 8205525 : Impro

RE: [RFR] 8205525 : Improve exception messages during manifest parsing of jar archives

2018-09-11 Thread Langer, Christoph
n by a system property of the same name" Best regards Christoph > -Original Message- > From: Baesken, Matthias > Sent: Dienstag, 11. September 2018 13:29 > To: Weijun Wang > Cc: Langer, Christoph ; Sean Mullan > ; security-dev@openjdk.java.net; core-libs- > d...

RE: [RFR] 8205525 : Improve exception messages during manifest parsing of jar archives

2018-09-10 Thread Langer, Christoph
Hi, > > do you think we need property jdk.includeInExceptions=jar at > all, if we don't resolve the absolute path? > > I think so. File path is still sensitive. > > In fact, I tend to believe people usually use absolute paths for JAR files (or > maybe made absolute by using a file:// URL somewhe

  1   2   >