Thanks David, will make a note of it for future reference.

Cheers,

Peter.

On 30/04/2021 12:57 am, David Lloyd wrote:
If it helps, we've solved this particular problem in a couple of places by using an MR-JAR which selects an implementation using `StackWalker` when Java 9+ is used.  I will say however that it appears to be slightly less performant, which is unfortunate (but hopefully fixable at some point in the future).

On Thu, Apr 29, 2021 at 1:48 AM Peter Firmstone <peter.firmst...@zeus.net.au <mailto:peter.firmst...@zeus.net.au>> wrote:

    We also use the SecurityManager for caller sensitive method calls.

    I re-implemented a secure implementation of Java Serialization,
    using a
    public API and fewer features (eg no circular links), in this
    implementation, each class in an object's hierarchy has its own
    namespace, the calling class is discovered using a SecurityManager
    subclass.

-- Regards,

    Peter Firmstone
    0498 286 363
    Zeus Project Services Pty Ltd.

    On 29/04/2021 3:37 pm, Peter Firmstone wrote:
    > Which version of Java is this planned for?   Will the last version
    > supporting the security manager be a long term support version, eg
    > back ports of security patches and TLS technologies?
    >
    > We have our own security manager implementation and policy provider
    > implementations.  Both of these are high performance and
    non-blocking
    > and we are able to dynamically grant and revoke some permissions.
    > While I acknowledge the Java policy implementation has a
    significant
    > performance impact, due to blocking permission checks, ours is less
    > than 1%.  Our software doesn't share PermissionCollection instances
    > among threads, or even have a Permissions cache,
    > PermissionCollection's are generated for each permission check and
    > discarded for garbage collection, the Permission object
    themselves are
    > cached (after initialization and safe publication), as are the
    results
    > of repeated permission checks.  We also have our own Permission
    > implementations.
    >
    > We have tools that generate policy files with least privilege,
    > although we will manually alter them with wildcards, for network
    > connections for instance.
    >
    > In our software, dynamic permissions are granted after
    authentication
    > of TLS connections.
    >
    > It is too early for me to tell if there are suitable replacement
    > technologies available.  I can understand the motivation for
    reducing
    > Java's software development burden, but I think this version of
    Java
    > might be the last for us, it would certainly be good if a long term
    > support version was available, perhaps indefinitely lol.
    >
    > Regards,
    >
    > Peter Firmstone
    > Zeus Project Services Pty Ltd.
    >
    >
    > On 16/04/2021 4:05 am, mark.reinh...@oracle.com
    <mailto:mark.reinh...@oracle.com> wrote:
    >> https://openjdk.java.net/jeps/411
    <https://openjdk.java.net/jeps/411>
    >>
    >>    Summary: Deprecate the Security Manager for removal in a future
    >>    release. The Security Manager dates from Java 1.0. It has
    not been
    >> the
    >>    primary means of securing client-side Java code for many years,
    >> and it
    >>    has rarely been used to secure server-side code. To move Java
    >> forward,
    >>    we intend to deprecate the Security Manager for removal in
    concert
    >> with
    >>    the legacy Applet API (JEP 398).
    >>
    >> - Mark
    >



--
- DML • he/him

Reply via email to