Current state: http://cr.openjdk.java.net/~briangoetz/amber/serialization.html
On Sat, May 26, 2018 at 1:39 PM Martijn Dashorst <martijn.dasho...@gmail.com> wrote: > > > https://www.infoworld.com/article/3275924/java/oracle-plans-to-dump-risky-java-serialization.amp.html?__twitter_impression=true > > Oracle plans to dump risky Java serialization > A “horrible mistake” from 1997, the Java object serialization capability > for encoding objects has serious security issues > > Paul Krill > > Getty Images > Oracle plans to drop from Java its serialization feature that has been a > thorn in the side when it comes to security. Also known as Java object > serialization, the feature is used for encoding objects into streams of > bytes. Used for lightweight persistence and communication via sockets or > Java RMI, serialization also supports the reconstruction of an object graph > from a stream. > > Removing serialization is a long-term goal and is part of Project Amber, > which is focused on productivity-oriented Java language features, says Mark > Reinhold, chief architect of the Java platform group at Oracle. > > To replace the current serialization technology, a small serialization > framework would be placed in the platform once records, the Java version of > data classes, are supported. The framework could support a graph of > records, and developers could plug in a serialization engine of their > choice, supporting formats such as JSON or XML, enabling serialization of > records in a safe way. But Reinhold cannot yet say which release of Java > will have the records capability. > > Serialization was a “horrible mistake” made in 1997, Reinhold says. He > estimates that at least a third—maybe even half—of Java vulnerabilities > have involved serialization. Serialization overall is brittle but holds the > appeal of being easy to use in simple use cases, Reinhold says. > > Recently, a filtering capability was added to Java so if serialization is > being used on a network and untrusted serialization data streams must be > accepted, there is a way to filter which classes can be mentioned, to > provide a defense mechanism against serialization’s security weaknesses. > Reinhold says Oracle has received many reports are received about > application servers running on the network with unprotected ports taking > serialization streams, which is why the filtering capability was developed. > >