Hi Matthew,

I reached out to you outside this list not long ago.  We have not forgot about 
you.  ;o)

Can you quickly enumerate your concerns (#1, #2, etc)?  They seem mostly 
related to zeroization.  I just want to be sure we capture all your concerns 
and don't miss any.

Regards,
Milton

On Mar 18, 2013, at 1:05 PM, Matthew Hall <mh...@mhcomputing.net> wrote:

> Hello,
> 
> Can anyone please respond to my feedback on the PKCS #11 provider? It's been 
> one month since I posted about several potential issues with the code. I 
> would 
> like to hear from someone with the necessary expertise. The OpenJDK process 
> isn't very community-friendly if nobody will try to reply.
> 
> Thanks,
> Matthew Hall.
> 
> On Tue, Feb 19, 2013 at 04:59:29PM -0800, Matthew Hall wrote:
>> I found another issue related to this topic.
>> 
>> Quite a number of bits of code are printing out the content of the private 
>> exponent of the RSA Private Keys by default into the toString() output, 
>> which 
>> could lead to key compromise if they're printed into a log.
>> 
>> share/classes/sun/security/pkcs11/P11Key.java:552:            sb.append("\n  
>> private exponent: ");
>> share/classes/sun/security/pkcs11/P11Key.java:624:            sb.append("\n  
>> private exponent: ");
>> share/classes/sun/security/rsa/RSAPrivateCrtKeyImpl.java:238:        
>> sb.append("\n  private exponent: ");
>> share/classes/sun/security/rsa/RSAPrivateKeyImpl.java:105:                + 
>> n + "\n  private exponent: " + d;
>> 
>> Ordinarily I believe FIPS and PCI would require that there isn't any code 
>> sitting around that could accidentally or unexpectedly print out the private 
>> key data. Is this toString() behaving that way for a good reason?
>> 
>> Matthew.

Reply via email to