On Thu, 28 Apr 2022 13:47:05 GMT, Sean Mullan <mul...@openjdk.org> wrote:

>> Changes requested by mullan (Reviewer).
>
>> @seanjmullan Since we use symmetric keys to encrypt entries and add 
>> integrity check, should this enhancement cover them as well? For example, if 
>> a PKCS12 keystore is created with `-J-Dkeystore.pkcs12.legacy=true`, should 
>> the algorithms used be warned? BTW, in legacy mode, we use 
>> PBEWithSHA1AndRC2_40 when encrypting keys. Should the security property 
>> include "RC2" as well?
>> 
>> Not sure if it's doable, because those are PKCS12-specific codes. `keytool` 
>> is not able to see them.
> 
> Right, I think this would require knowledge of what keystore type is being 
> used and parsing the PKCS12 encoded bytes which seems beyond the scope of 
> this RFE. Also, those algorithms are disabled by default, so in some sense 
> the user is making a decision to use them by enabling the system property and 
> therefore are taking the risk themselves.

@seanjmullan @wangweij Thanks for the review!

-------------

PR: https://git.openjdk.java.net/jdk/pull/8300

Reply via email to