Re: [concurrency-interest] ThreadLocalRandom clinit troubles

2014-07-14 Thread Bernd
() (which nobody uses?!) did not improve things IMHO. Bernd PS: I think the webrev changed since then, but the mail from Brad describes the problem well: http://mail.openjdk.java.net/pipermail/security-dev/2013-January/006288.html Am 14.07.2014 21:05 schrieb "Oleksandr Otenko" : >

Linux getrandom() support

2014-10-05 Thread Bernd
avoid problems when the dev files are missing in some container/virtualisation systems. Greetings Bernd

Re: Linux getrandom() support

2014-10-06 Thread Bernd
specify GRND_RANDOM) but still only get bytes if the machine was seeded at boot (and block or fail in those cases). Greetings Bernd 2014-10-06 18:26 GMT+02:00 Bradford Wetmore : > > Worth looking into, but no plans at the moment. > > Do you have a link? > > Brad > > > >

disabled SSL3 not reflected in "supported protocols"

2015-01-27 Thread Bernd
r backward compatibility). Gruss Bernd PS: testcode: //Security.setProperty("jdk.tls.disabledAlgorithms", ""); System.out.printf("%s %s jdk.tls.disabledAlgorithms=%s%n", System.getProperty("java.version", "?"),

DH Key sizes (again)

2015-03-24 Thread Bernd
sends even 6k and 8k (standard) primes. I see a comment in the source that the DH provider needs to be improved to actually handle those. So I wonder if there are any plans for this? Is there a good way to request it? Would filing a RFE on bugreport.java.com be the right place? Gruss Bernd

[TLS-backport8] Does TLSv1.3 work with www.google.com

2020-08-10 Thread Bernd
.+ 0010: AE 99 7D 3C 30 08 F4 00 F3 B0 A9 17 DE 0E B1 16 ...<0... 0020: 0D 45 46 87 42 B0 83 68 FB 15 E9 79 D2 40 8C DA .EF.B..h...y.@.. 0030: 38 FF 76 52 1D 40 10 A0 BE 39 75 8B 79 F0 CD A1 8.vR.@ ...9u.y... 0040: E1 } }, ] } ] } ) ... javax.net.ssl|FINE|01|main|2020-08-11 01:45:23.288 CEST|Logger.java:765|Received alert message ( "Alert": { "level" : "fatal", "description": "protocol_version" } ) Gruss Bernd

ldap.mechsAllowedToSendCredentials - only SASL?

2020-10-21 Thread Bernd
"secure" mechanisms like DIGEST-MD5 or different methods like GSSAPI or SIMPLE? Gruss Bernd

Re: ldap.mechsAllowedToSendCredentials - only SASL?

2020-10-21 Thread Bernd
ECURITY_PRINCIPAL)) { Gruss Bernd Am Mi., 21. Okt. 2020 um 18:21 Uhr schrieb Bernd : > Hello, > > I am looking at 11.0.9 PSU (as of Zulu 11.43-sa) about the CVE-2020-14781 > / JDK-8237990 fix and try to understand if my customers might be > affected. > > jdk.jndi.ldap.mechsAllo

Re: ldap.mechsAllowedToSendCredentials - only SASL?

2020-10-21 Thread Bernd
'mechsAllowedToSendCredentials' is set to any value via system/context environment properties+if (!isConnectionEncrypted() && (contextSeenStartTlsEnabled || anyPropertyIsSet)) { Am Mi., 21. Okt. 2020 um 19:26 Uhr schrieb Bernd : > BTW: the security patch looks like "simple" is s

Re: Design review: JEP 273: DRBG-Based SecureRandom Implementations

2015-11-09 Thread Bernd
DrbgSpec: A DRBG will be reseeded aotomatically BTW: some places specify "optional" should this be defined as "empty byte array or null"? Gruss Bernd Wang Weijun schrieb am Mo., 9. Nov. 2015 21:04: > Hi All > > The following is API/SPI to support NIST 800-90A DRB

Lets encrypt in root program

2016-02-17 Thread Bernd
or it: https://community.letsencrypt.org/t/will-the-cross-root-cover-trust-by-the-default-list-in-the-jdk-jre/134/10 In that thread it is mentioned that there is an application for the Oracle root cert program, so hopefully its just a matter of short time? Does it help to nag? :) Gruss Bernd

JDK-8133634 ava gets SunMSCAPI entry as TrustedCertificateEntry instead of PrivateKeyEntry

2017-03-01 Thread Bernd
plication. (And I guess it would solve a few of the problems with alternative sign formats, with unavailable smartcard stubs etc. So any idea if we see CNG support any time soon, it is available since Vista. Gruss Bernd PS: can somebody extend the JIRA with my research (attribution welcome).

Generate Keypairs with strong prng provider (SHA1PRNG)

2017-03-16 Thread Bernd
://hg.openjdk.java.net/jdk9/jdk9/jdk/file/c95ebfceb394/src/java.base/share/classes/sun/security/tools/keytool/CertAndKeyGen.java#l150 Is it really acceptable for long term keys this way? (I guess no answer means no :) Would it be possible to bump the security level for keytool in 9? Gruss Bernd

NTNumericCredential of the NTLoginModule JAAS module

2017-04-24 Thread Bernd
) authentication. Does anybody know how this can be used or how it was used? The UnixSystem/UnixLoginModule counterpart does not have this provision. Any generally is there a good use for the NTLoginModule, how would it be used to actually enforce access control? Gruss Bernd

Re: [9] RFR: 8180307: Add new JDK 9 Required Algorithms to Cipher class

2017-05-12 Thread Bernd
Is the PKCS5 Padding a real padding with GCM or only an ignored alias? If it is an alias, should it be documented here? 2017-05-12 19:59 GMT+02:00 Sean Mullan : > A couple of new required algorithms for JDK 9 were accidentally omitted > for the Cipher class as part of JDK-8015388. Docs only chang

ECC Key Usage ignored with and ECDH(E) ciphers

2017-05-23 Thread Bernd
is also apply to client side? I have not tested it with RSA certificates, but I would expect this to be the same. Gruss Bernd PS: config file and openssl commands to create multiple ECC certificates used for this test: https://gist.github.com/ecki/d66d79bf0cf12872d015804f5edec6e4

Stricter Public Key checking corrupts JKS

2017-06-09 Thread Bernd
I noticed there is a bug (8177657,etc) about stricter DER checking on JDK Certificate code. I have an JKS Keystore which no longer can be opened because of that. I understand that the strict parsing has to stay for public keys, however I wonder if anything can be done about loading the other keys

Untranslated common (ZIPCode OID.2.5.4.17) attribute

2017-06-10 Thread Bernd
/53142e39bfa7/src/java.base/share/classes/sun/security/x509/AVA.java Gruss Bernd

Re: Stricter Public Key checking corrupts JKS

2017-06-14 Thread Bernd
in, I will test that later on. Gruss Bernd 2017-06-12 13:29 GMT+02:00 Sean Mullan : > Hi Bernd, > > This issue should be fixed in 8u131. Can you try that and let us know? > > --Sean > > > On 6/9/17 10:18 PM, Bernd wrote: > >> I noticed there is a bug (8177

Re: [10] RFR: 8182388: Backout 8182143

2017-06-16 Thread Bernd
I think the new bug description is backward, as you cannot expect to implement all algorithms in all providers or use a key class fron one provider in antoher (especially not if they use mechanisms in external APIs like PKCS11 or MSCAPI with HSM). "Crypto keys should be compatible between security

jar verification regression Oracle 8u141

2017-07-19 Thread Bernd
sections like that like before. Gruss Bernd

Re: jar verification regression Oracle 8u141

2017-07-19 Thread Bernd
Hello, one more thing: 2017-07-19 14:01 GMT+02:00 Bernd : > I think different jarsigner versions behave differently, some remove that > section. > It is actually not "different jarsigner versions", but we have our own jar signer implementation (used for self signed test

Re: RFR 8183591: Incorrect behavior when reading DER value with Integer.MAX_VALUE length

2017-07-20 Thread Bernd
. Gruss Bernd 2017-07-20 15:49 GMT+02:00 Adam Petcher : > Oops. Better to throw an IOException when a negative length is given to > readFully. > > Webrev: http://cr.openjdk.java.net/~apetcher/8183591/webrev.02/ > > > > On 7/18/2017 1:55 PM, Adam Petcher wrote: > >&

java.security still talks about "limited" as default

2017-11-13 Thread Bernd
es of where limited would be needed? Gruss Bernd

sunrsasign.jar still searched in java 8?

2018-01-19 Thread Bernd
.net/jdk8u/jdk8u/hotspot/file/tip/src/share/vm/runtime/os.cpp#l1197 Gruss Bernd

provider registration

2018-02-28 Thread Bernd
works, BCProv is not yet modularized or service loader enabled. Classpath and programmatic registration works fine). Is that correct? Gruss Bernd

Re: RFR: 8280494: (D)TLS signature schemes

2022-01-27 Thread Bernd
On Thu, 27 Jan 2022 22:06:21 GMT, Xue-Lei Andrew Fan wrote: > This update is to support signature schemes customization for individual > (D)TLS connection. Please review the CSR as well: > CSR: https://bugs.openjdk.java.net/browse/JDK-8280495 > RFE: https://bugs.openjdk.java.net/browse/JDK-8280

Re: RFR: 8280494: (D)TLS signature schemes [v4]

2022-01-29 Thread Bernd
On Sat, 29 Jan 2022 05:31:08 GMT, Xue-Lei Andrew Fan wrote: >> src/java.base/share/classes/javax/net/ssl/SSLParameters.java line 763: >> >>> 761: >>> 762: String[] tempSchemes = signatureSchemes.clone(); >>> 763: for (String scheme : tempSchemes) { >> >> In addition to this loo

Re: RFR: JDK-6782021: It is not possible to read local computer certificates with the SunMSCAPI provider

2022-04-26 Thread Bernd
On Tue, 12 Apr 2022 19:03:40 GMT, Mat Carter wrote: > On Windows you can now access the local machine keystores using the strings > "Windows-MY-LOCALMACHINE" and "Windows-ROOT-LOCALMACHINE"; note the > application requires admin privileges. > > "Windows-MY" and "Windows-ROOT" remain unchanged,

Re: RFR: JDK-6782021: It is not possible to read local computer certificates with the SunMSCAPI provider

2022-04-26 Thread Bernd
On Tue, 12 Apr 2022 19:03:40 GMT, Mat Carter wrote: > On Windows you can now access the local machine keystores using the strings > "Windows-MY-LOCALMACHINE" and "Windows-ROOT-LOCALMACHINE"; note the > application requires admin privileges. > > "Windows-MY" and "Windows-ROOT" remain unchanged,

Re: RFR: JDK-6782021: It is not possible to read local computer certificates with the SunMSCAPI provider

2022-04-26 Thread Bernd
On Wed, 27 Apr 2022 02:21:07 GMT, Bernd wrote: >> On Windows you can now access the local machine keystores using the strings >> "Windows-MY-LOCALMACHINE" and "Windows-ROOT-LOCALMACHINE"; note the >> application requires admin privileges. >> >>

JSSE Debug Log redirection

2020-11-03 Thread Bernd
ull log global null log ALL JUL close JUL close ... I get the same output with -Djava.net.debug=all and -Djava.net.debug. Looks like the SSLContextImpl or Dinished.java is always using its own logger with no way to register an handler? Gruss Bernd PS: the sample code is here: /* SPDX-License-Ide

Java and the NTFS Path weakness

2021-01-17 Thread Bernd
le names from untrusted user input (including uncompressing ZIP files). Gruss Bernd

Re: Java and the NTFS Path weakness

2021-01-18 Thread Bernd
)) will crash Windows immediatelly. I verified this on the latest Windows Server 2019 January Security Update. var bad = ".\\globalroot\\device\\condrv\\kernelconnect" Gruss Bernd Am Mo., 18. Jan. 2021 um 01:39 Uhr schrieb Bernd : > Hello, > > you might have seen the

Add CBC and DHE to legacy ciphers (avoid cipher order)?

2021-08-19 Thread Bernd
changed if minsize 2048 is set and/or if size agreement is in place. Gruss Bernd

Re: RFR: 8267108: Alternate Subject.getSubject and doAs APIs that do not depend on Security Manager APIs [v2]

2021-10-22 Thread Bernd
On Sat, 23 Oct 2021 00:40:39 GMT, Weijun Wang wrote: >> New `Subject` APIs `current()` and `callAs()` are created to be replacements >> of `getSubject()` and `doAs()` since the latter two methods are now >> deprecated for removal. >> >> In this implementation, by default, `current()` returns t

Re: RFR: 8267108: Alternate Subject.getSubject and doAs APIs that do not depend on Security Manager APIs [v2]

2021-10-22 Thread Bernd
On Fri, 22 Oct 2021 22:00:57 GMT, Bernd wrote: >> Weijun Wang has updated the pull request incrementally with one additional >> commit since the last revision: >> >> renames > > src/java.security.jgss/share/classes/sun/security/jgss/krb5/Krb5Util.java > li

Re: RFR: 8267108: Alternate Subject.getSubject and doAs APIs that do not depend on Security Manager APIs [v2]

2021-10-25 Thread Bernd
On Mon, 25 Oct 2021 17:58:15 GMT, Weijun Wang wrote: >> src/java.base/share/classes/javax/security/auth/Subject.java line 325: >> >>> 323: >>> 324: // Store the current subject to a ThreadLocal when a system >>> property is set. >>> 325: private static final boolean USE_TL = "true".equ

Re: RFR: 8267108: Alternate Subject.getSubject and doAs APIs that do not depend on Security Manager APIs [v2]

2021-10-25 Thread Bernd
On Mon, 25 Oct 2021 18:08:19 GMT, Weijun Wang wrote: >> src/java.security.jgss/share/classes/sun/security/jgss/krb5/Krb5Context.java >> line 708: >> >>> 706: @SuppressWarnings("removal") >>> 707: final Subject subject = >>> 708:

Re: Debuggability of failures in sun.security.rsa.RSASignature

2013-04-08 Thread Bernd Eckenfels
many situations it would be good to actually know about padding errors). Bernd -- http://bernd.eckenfels.net

Re: Code review request: 8009636: JARSigner including TimeStamp PolicyID (TSAPolicyID) as defined in RFC3161

2013-04-11 Thread Bernd Eckenfels
Should the comment describe the expected oid format for the string (Numeric only?) and mention a defining reference (RFC3161)? I havent found some sample OIDs used here, which are common? BTW: why is it linked to the URL? Bernd -- bernd.eckenfels.net Am 12.04.2013 um 02:34 schrieb Weijun

Re: Ignore SSL server_name extension alerts (Bug 7127374)

2013-04-15 Thread Bernd Eckenfels
Hello, Will answer in detail, but just make sure People are Not confused: the TSA seems to be fixed meanwhile. Gruss Bernd -- bernd.eckenfels.net Am 15.04.2013 um 05:40 schrieb Xuelei Fan : > On 1/21/2013 7:25 AM, Bernd Eckenfels wrote: >> Hello, >> >> quite some time

Re: Code review request, 7188658 Add possibility to disable client initiated renegotiation

2013-05-29 Thread Bernd Eckenfels
). Bernd -- bernd.eckenfels.net Am 29.05.2013 um 17:39 schrieb Xuelei Fan : > Hi, > > This fix is an enhancement to add the ability in JSSE server side to > reject client initialized renegotiation. > > webrev: http://cr.openjdk.java.net/~xuelei/7188658/webrev.00/ > > Thanks, > Xuelei

Re: Code review request, 7188658 Add possibility to disable client initiated renegotiation

2013-05-29 Thread Bernd Eckenfels
. I was expecting 7188658 to address another point, but I might be wrong. I understand that as of Oracle policy we cannot discuss it. Even if this is a very well known issue. :-/ Greetings Bernd -- http://bernd.eckenfels.net Date Created: Mon Nov 12 12:13:08 MST 2012 Type:bug Customer Name

Re: hg: jdk8/tl/jdk: 8019224: add exception chaining to RMI CGIHandler

2013-06-27 Thread Bernd Eckenfels
you want to output the stack trace, it should be done inside those two handlers. BTW: Is somebody really using this? Greetings Bernd Am 27.06.2013, 22:33 Uhr, schrieb : Changeset: 6729f7ef94cd Author:smarks Date: 2013-06-27 13:35 -0700 URL: http://hg.openjdk.java.net/jdk8/tl

Re: Code review request, 7188658 Add possibility to disable client initiated renegotiation

2013-06-27 Thread Bernd Eckenfels
all ciphersuites after initial handshake). You dont need to add code if you dont offer more (i.e. ignore) options. Greetings Bernd PS: and regarding the naming a question, is "JSSE" the name of the Sun implementaion or of the Specification? -- http://bernd.eckenfels.net

Re: TLS extension needed for HTTP/2.0

2013-07-25 Thread Bernd Eckenfels
clear SPI for SSLSocket and the java package namespace makes it necesary to actually touch all classes to get them compiled in parallel to a normal JDK. Gruss Bernd Am 25.07.2013, 16:15 Uhr, schrieb Zhong Yu : Hi, can someone shed some light on the questions? Any information will be greatly

Re: hg: jdk8/tl/jdk: 8020854: change RMI javadocs to specify that remote objects are exported to the wildcard address

2013-08-05 Thread Bernd Eckenfels
preferred family different from that. So it is better to use the literal returned by that function. (or remove this from javadoc). Bernd

Re: There should be a way to reorder the JSSE ciphers

2013-08-06 Thread Bernd Eckenfels
a SSL implementation needs more than a ordered list, so it would do something implementation dependend anyway, why would one need a standardized boolean in addition? Bernd

Re: There should be a way to reorder the JSSE ciphers

2013-08-06 Thread Bernd Eckenfels
cify the strategy. This option name can be standadized and others then can pick it up as well. You could even specify "RFC" and "ServerOrder" as the two mandatory supported options. Greetings Bernd

Re: There should be a way to reorder the JSSE ciphers

2013-08-07 Thread Bernd Eckenfels
provider specific algorithms, Integers would only work with a registry. Strings are self describing enough to go without a registry (if you want to be safe you could use URIs like XML Parser params/features). Gruss Bernd -- http://bernd.eckenfels.net

Re: There should be a way to reorder the JSSE ciphers

2013-08-07 Thread Bernd Eckenfels
dont know about bugs who allow to negotiate disabled ciphers. Picking suboptimal ciphers from the point of view of the server operator can of course still happen with a short(er) list. It would be good if JDK JSSE can provide a different selector strategy. Gruss Bernd

Re: hg: jdk8/tl/jdk: 8019853: Break logging and AWT circular dependency

2013-09-06 Thread Bernd Eckenfels
if (javaAWTAccess == null) { 174 return null; 175 } 176 return javaAWTAccess; Greetings Bernd

Re: [8] Review Request for 8007292 : Add JavaFX internal packages to package.access

2013-10-10 Thread Bernd Eckenfels
me virtual filesystems do a lot of commit work on close. So typically you add a close inside the try as well. Greetings Bernd Am 10.10.2013, 04:36 Uhr, schrieb Joseph Darcy : It is a hazard (I thought I had published a blog entry on this very tropic, but apparently not). The most robust

JNLP with unsigend resources is no longer loaded with SunJDK 7U45

2013-10-15 Thread Bernd Eckenfels
begin with complain :) Gruss Bernd java.lang.SecurityException: com.sun.deploy.net.JARSigningException: Unsignierter Eintrag gefunden in Ressource: http://localhost:1/sjar at com.sun.deploy.cache.CacheEntry.getJarFile(Unknown Source) at

Re: JNLP with unsigend resources is no longer loaded with SunJDK 7U45

2013-10-16 Thread Bernd Eckenfels
Am 16.10.2013, 05:01 Uhr, schrieb Bernd Eckenfels : java.lang.SecurityException: com.sun.deploy.net.JARSigningException: Unsignierter Eintrag gefunden in Ressource: http://localhost:1/sjar I was checking if deployment rules would help me here. But if I create a run-rule for this

Re: InvocationTargetException when running applet locally

2013-10-17 Thread Bernd Eckenfels
ained here for example: http://www.duckware.com/tech/java-security-clusterfuck.html) Greetings Bernd

Re: InvocationTargetException when running applet locally

2013-10-18 Thread Bernd Eckenfels
t tag) and it did not help. This version is really bad :-/ Bernd -- http://bernd.eckenfels.net

Re: InvocationTargetException when running applet locally

2013-10-18 Thread Bernd Eckenfels
HTML has become much more powerfull lately. This "situation" (and I dont blame Oracle it started in sun times) really kills Java on the Desktop. Gruss Bernd -- http://bernd.eckenfels.net

Re: RFR: JDK-8027624 - com/sun/crypto/provider/KeyFactory/TestProviderLeak.java unstable again

2013-10-31 Thread Bernd Eckenfels
using File.newDirectoryStream of NIO.2 Gruss Bernd -- http://bernd.eckenfels.net

qualified host parameter for UnknownHostException? (was: hg: jdk8/tl/jdk: 8028074: InetAddress.getByName fails with UHE "invalid IPv6 address" if host name starts with a-f)

2013-11-08 Thread Bernd Eckenfels
, String host, String osError) would be really usefull? Gruss Bernd -- http://bernd.eckenfels.net

SHA-1 correctness and speed

2013-11-15 Thread Bernd Eckenfels
Digest.SHA-1 -> org.bouncycastle.jce.provider.JDKMessageDigest$SHA1 aliases: [SHA1, SHA, 1.3.14.3.2.26] Digest:SHA-1 Message Digest from BC 275951648768bytes x nul hash=6938f23e29e7d3dcd100d0ed2df9d6593113718f in 9275,935s That is 35MiB/s vs. 28MiB/s vs. openssl 57MiB/s Bernd * cygwin dd

Re: 8029904: Remove com.sun.security.auth.callback.DialogCallbackHandler

2013-12-10 Thread Bernd Eckenfels
$PasswordCallbackHandler, this inner class access to password field is quite confusing. (I guess one could file a cleanup RFE for both issues instead as well). Gruss Bernd Am 10.12.2013, 17:46 Uhr, schrieb Alan Bateman : DialogCallbackHandler is the sample Swing based CallbackHandler in the JDK-specific API to

RSA blinding

2013-12-19 Thread Bernd Eckenfels
suggest that the ciphertext randomization from Tsuyoshi Takagi to be used. BC has an RSA blinding implementation, but mostly concerned with using it for blind signatures. When blinding is only used to add randomness it would not require parameters to be configured. Greetings Bernd -- http

Re: Code review request, 8028518, Increase the priorities of GCM cipher suites

2014-01-03 Thread Bernd Eckenfels
nd configure the list accordingly. The default can then be more practially oriented. Greetings Bernd -- http://bernd.eckenfels.net

FYI: ssl ciphers (howsmyssl.com)

2014-02-15 Thread Bernd Eckenfels
one_splitting":false, "insecure_cipher_suites":{}, "tls_version":"TLS 1.2", "rating":"Improvable"} Not sure what contributes to improvable, I guess the absence of session ticket support is the major point here. We talked about the sequence of ciphers before. Anyway, as I read here: https://blogs.oracle.com/java-platform-group/entry/java_8_will_use_tls "PFS is not enabled by default", but the cipher list looks otherwise? (which I think is good), But, I am not sure why TLS_RSA_WITH_AES_128_CBC_SHA256 is higher prioritized than TLS_DHE_RSA_WITH_AES_128_CBC_SHA256? Greetings Bernd PS: https://github.com/ecki/JavaCryptoTest/blob/master/src/main/java/net/eckenfels/test/howsmyssl/Client.java

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-04 Thread Bernd Eckenfels
nition make sure to read till the end and check the close(). Bernd BTW: thanks Florian to mention it might not be a good idea to uncompress unverified data. (but this point does not make me happy from a streaming perspective :)

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-06 Thread Bernd Eckenfels
ding and authentication exceptions in the Javadoc. Greetings Bernd

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-06 Thread Bernd Eckenfels
Hello Matthew, List, Am Thu, 6 Mar 2014 15:44:27 -0800 schrieb Matthew Hall : > On Thu, Mar 06, 2014 at 10:01:57PM +0100, Bernd Eckenfels wrote: > > My thinking was, that the "streamed" mode is usefull, but the > > "secure" mode is also usefull. At least for B

Re: Review Request of JDK 9 Enhancement Proposal: AEAD/CCM Cipher Mode

2014-03-24 Thread Bernd Eckenfels
Am Mon, 24 Mar 2014 16:13:17 -0700 schrieb "Valerie (Yu-Ching) Peng" : > > Here is the enhancement proposal for adding CCM cipher mode support > to JDK. For details, please refer to the following JEP: > > http://cr.openjdk.java.net/~valeriep/8008342/jepCCM.txt > > Comments or feedback welcome.

Re: Review request: 8040059 Change default policy for extensions to no permission

2014-04-22 Thread Bernd Eckenfels
to ship the JAR only in a dir where they CAN be added to the classpath, but are not by default (similiar to javadb/derby). Gruss Bernd Am Tue, 22 Apr 2014 12:39:57 -0700 schrieb Mandy Chung : > This change proposes to remove granting all permissions for > extensions as the default and impl

Get intermediate MessageDigest state?

2014-05-22 Thread Bernd Eckenfels
Bernd

Locking/Singleton in JCAUtil

2014-05-22 Thread Bernd Eckenfels
lic static SecureRandom getSecureRandom() { return secureRandom; } WDYT? Gruss Bernd

Re: Locking/Singleton in JCAUtil

2014-05-22 Thread Bernd Eckenfels
And just a followup: it is interesting to note, that this Utility is still used as default random source for Key Generators and DSA Signatures. I would expect those need to refer to SecureRandom.getInstanceStrong() instead? (the string instance getter is nowhere used?) Bernd

Re: Get intermediate MessageDigest state?

2014-05-22 Thread Bernd Eckenfels
ely. My problem is, that I need to serialize the state to a database or file. The problem about the non-clone support is not a big problem for me, as I can select a well known provider. Greetings Bernd

Re: Get intermediate MessageDigest state?

2014-05-22 Thread Bernd Eckenfels
y. Yes, I have the need to persist the partial state in a database. So I would need to get the actual state bytes. In some cases I can use the clone() and its also not a big problem to request providers which are known to be Cloneable. Greetings Bernd

AW: Trusted service?

2014-08-13 Thread Bernd Eckenfels
Just a BTW: It would be really cool to have a SPI interface for that, so people who need SRP, CCM or shared secret handshakes (or stuff like NPN?) don't need to use a third party SSL engine. -- http://bernd.eckenfels.net - Ursprüngliche Nachricht - Von: "Wang Weijun" Gesendet: ‎13.‎08

Re: Please review CR 8048356 Secure Random provider tests

2014-08-27 Thread Bernd Eckenfels
secure random getter as well? what about testing the sorting logic (based on the egd url property) I think this is still implemented, even with the different seeding modes for Native. Gruss Bernd -- http://bernd.eckenfels.net - Ursprüngliche Nachricht - Von: "raghu k.nair"

Re: JEP Review Request: OCSP Stapling for TLS

2014-09-02 Thread Bernd Eckenfels
could work around by constructing the client socket with no hostname, but I really wish both features could be controlled dynamically. Greetings Bernd Am Tue, 02 Sep 2014 14:15:45 -0700 schrieb Jamil Nimeh : > Hello all, > > The draft JEP "OCSP Stapling for TLS" has been ope

NoSuchMethod in 9ea-b30 getRawHostnameSE

2014-09-16 Thread Bernd Eckenfels
ersion, is this before or after the modular split? The latest code does not seem to match the stacktrace: http://hg.openjdk.java.net/jdk9/jdk9/jdk/file/40c3a5ce8047/src/java.base/share/classes/sun/security/ssl/ClientHandshaker.java Gruss Bernd

Re: [undertow-dev] NoSuchMethod in 9ea-b30 getRawHostnameSE

2014-09-17 Thread Bernd Eckenfels
painfull and keep Java as recent as protocol support as one would expect. (And sorry for the "false" alert, rory :) Gruss Bernd Am Wed, 17 Sep 2014 12:14:05 +1000 schrieb Stuart Douglas : > This is because Undertow is testing SPDY and HTTP2, which use Jetty > ALPN. This ja

Re: JDK-8039921: SHA1WithDSA with key > 1024 bits not working

2014-09-18 Thread Bernd Eckenfels
protocols which have different needs and threat scenarios. Crypto primitives should stay away from that policing. Gruss Bernd Am Fri, 19 Sep 2014 09:56:02 +0900 schrieb Atsuhiko Yamanaka : > Hi, > > Thank you for your quick response, > > On Fri, Sep 19, 2014 at 9:04 AM, Valeri

endpoint identification algorithm, only in "1.2"?

2014-10-08 Thread Bernd Eckenfels
king and trustsstore, right? (so I better customize the ExtendedX509TrustManager for checks in addition to the normal checks, right? * http://hg.openjdk.java.net/jdk9/jdk9/jdk/file/21568031434d/src/java.base/share/classes/sun/security/ssl/X509TrustManagerImpl.java#l454 Greetings Bernd

ssl clients (poodle)

2014-10-22 Thread Bernd Eckenfels
which cannot be circumvented (i.e. works with all requested protocols and even when enable is called). (and maybe jdk.tls.*.cipher.blacklist as well) Besides that, any news on the FALLBACK_SCSV patch from Florian? Gruss Bernd

TLS hostname verifier: reverse resolves peer addresses?

2014-11-02 Thread Bernd Eckenfels
I actually wanted to make sure hostname verification is not skipped, no matter how I configure it). Gruss Bernd (*) https://github.com/ecki/JavaCryptoTest/blob/master/src/main/java/net/eckenfels/test/howsmyssl/Client.java#L31

Re: A fully fledged TLS Extensions API ?

2014-11-10 Thread Bernd Eckenfels
not bound to the providers, but to the actual primitive needed (like AES GCM). Gruss Bernd Am Mon, 10 Nov 2014 14:28:44 +0100 schrieb Simone Bordet : > Hi, > > On Mon, Nov 10, 2014 at 2:07 PM, Florian Weimer > wrote: > > On 11/07/2014 02:06 PM, Simone Bordet wrote: > >

Re: URLStreamHandler.getHostAddress() performance

2014-11-25 Thread Bernd Eckenfels
dont think this is needed, InetAddress does synchronisation itself (InetAddress.getAddressFromNameService() is used inside synchronized(cacheLock)). Gruss Bernd Am Tue, 25 Nov 2014 22:13:10 +0800 schrieb Wang Weijun : > > > On Nov 25, 2014, at 20:55, Tom Hawtin wrote: > > >

Re: Is it reasonable to compare outputs between JMH and hprof?

2014-12-03 Thread Bernd Eckenfels
That does tell all IMHO. Gruss Bernd Am Thu, 4 Dec 2014 12:09:49 +0800 schrieb Wang Weijun : > Hi All > > I am comparing the difference of SHA-1 and SHA-256. First I wrote a > JMH benchmark: > > @Benchmark > public void sig1(Blackhole bh) throws Exception { > bh.consume(s

Re: Detecting whether an algorithm is supported without creating one?

2014-12-11 Thread Bernd Eckenfels
Just get it and throw it away, it is easier than iterating the algorithms of the providers. > Am 12.12.2014 um 05:02 schrieb Weijun Wang : > > I'd like to check if "SHA-256" is supported without calling > MessageDigest.getInstance("SHA-256"). Does such a method exist? > > My case is a multi-t

constant time compare is not used anywhere important

2015-02-04 Thread Bernd Eckenfels
am not sure if an intrinsic applied here) Gruss Bernd PS: (i know, non-comment policy but I dont really see a reason to embargo this. Java is hardly a good candidate for safe crypto (unfortunatelly).

skip-tls

2015-03-03 Thread Bernd Eckenfels
I know here on the list are people which are not all developers of the security components but care about java security, so I guess it is fine to share that pointer here. Gruss Bernd

Re: TLS ALPN Proposal

2015-05-22 Thread Bernd Eckenfels
be a 8bit clean encoding (and will be compatible to all ASCII only strings). It is still ugly and needs to be documanted cleanly that the string you get back might not be a string at all. Gruss Bernd

disabledAlgorithms "DHE keySize < 1024" support?

2015-05-22 Thread Bernd Eckenfels
there another way to do that? Gruss Bernd

Re: disabledAlgorithms "DHE keySize < 1024" support?

2015-05-23 Thread Bernd Eckenfels
I think this does not address the minimum accepted size of an client SSLSocket (at least I could not see that in the description). It only allows to configure the server generated groups in the ServerKeyExchange. When setting jdk.tls.ephemeralDHKeySize=2048 I still can connect to https://dhe512

Re: disabledAlgorithms "DHE keySize < 1024" support?

2015-05-23 Thread Bernd Eckenfels
miiar with the code, maybe you can point me to a place where the DHE size would be validated). Thinking about it, it might be possible to register an own DiffieHellmann provider to enforce a limit, hm. Gruss Bernd

Re: disabledAlgorithms "DHE keySize < 1024" support?

2015-05-23 Thread Bernd Eckenfels
Am Sat, 23 May 2015 17:18:07 +0200 schrieb Bernd Eckenfels : > I searched the ClientHandshaker for usages of algorithmConstraints, > and it does not use it for the DHE part. It only question > KEY_AGREEMENT for cipher suite selection. (But I am not so famiiar > with the code, maybe y

Re: disabledAlgorithms "DHE keySize < 1024" support?

2015-05-23 Thread Bernd Eckenfels
Am Sat, 23 May 2015 17:48:25 +0200 schrieb Bernd Eckenfels : > I also run some connection test In case somebody wonders, the test code is here: https://github.com/ecki/JavaCryptoTest#simple-weakdh-logjam-test-client Gruss Bernd

configurable DHE key size

2015-05-23 Thread Bernd Eckenfels
Hello, I need to correct a statement: Am Sat, 23 May 2015 15:50:06 +0200 schrieb Bernd Eckenfels : > BTW in Regards to the Server side: > > That document should mention that the parameter group is generated > randomly on first use (matching DSA restrictions). It is a good thing &g

Re: Run-time configurable sandboxes

2015-05-26 Thread Bernd Eckenfels
est user might as well be Google App Engine (not sure how far their special platform relies on the security manager). Gruss Bernd PS: Michael I would be interested in your paper for my personal education.

Re: disabledAlgorithms "DHE keySize < 1024" support?

2015-06-23 Thread Bernd Eckenfels
of DHE completely before, so they did not use the keySize syntax either). Gruss Bernd

  1   2   3   >