It's not easy to find out the word difference after a CSR edit.

But you changed

   everyone (yes, everyone) has been loading cacerts with a null password and 
they are able to read all certificate inside.

to

   everyone (yes, everyone) who loads cacerts with a null password is able to 
read all certificates inside.

I *did* mean that *everyone* is using the null password. Did you not?

--Max


> On May 31, 2019, at 4:27 PM, Langer, Christoph <christoph.lan...@sap.com> 
> wrote:
> 
> Hi Max,
> 
> I've already made some updates to the wording in the CSR.
> 
> In the specification section, it should probably also not mention the source 
> location src/java.base/share/lib/security/cacerts as it is about to be 
> eliminated by JDK-8193255. It should rather refer to 
> <JDK>/lib/security/cacerts, I think.
> 
> Best regards
> Christoph
> 
>> -----Original Message-----
>> From: security-dev <security-dev-boun...@openjdk.java.net> On Behalf Of
>> Weijun Wang
>> Sent: Freitag, 31. Mai 2019 05:33
>> To: security-dev@openjdk.java.net
>> Subject: RFR CSR for 8162628: Migrating cacerts keystore to password-less
>> PKCS12 format
>> 
>> Please review the CSR at
>> 
>>   https://bugs.openjdk.java.net/browse/JDK-8224891
>> 
>> (Oh, I hate the CSR having a different bug id.)
>> 
>> Basically, with this change, the cacerts file can be loaded with
>> 
>>   KeyStore.getInstance("JKS" or "PKCS12").load(stream, null or anything) or
>>   KeyStore.getInstance(new File("cacerts"), null or anything)
>> 
>> so hopefully all your old code should still work.
>> 
>> I've also opened another RFE [1] that intends to find a different way to tag
>> jdkCA entries in cacerts other than appending "[jdk]" to the alias.
>> 
>> Thanks,
>> Max
>> 
>> [1] https://bugs.openjdk.java.net/browse/JDK-8225099
> 

Reply via email to