[RFC][icedtea-web] -Xtrustall opinion added

Omair Majid omajid at redhat.com
Mon Jun 27 07:46:06 PDT 2011


On 06/26/2011 02:04 PM, Jiri Vanek wrote:
> Hi!
> Attached patch is adding (especially for testing purposes) -Xtrustall
> parameter for javaws. When javaws is lunched with this parameter, then
> user is not asked for any security issues, and any necessary steps he
> had to accept are now trusted.
> I believe it is implemented correctly, because running code which need
> to be signed on signed, but without permissions or unsigned will still
> fail.

Sorry, I dont understand this bit. Xtrustall will just trust all 
certificates right? If there are none, there is nothing to trust and so 
things will

> It is worthy to say, that there already existed
> DeploymentConfiguration.KEY_SECURITY_PROMPT_USER key for deploy
> configuration, but this one just hiding all security dialogs to user,
> but thy were then evaluated as untrusted.

That's working as designed. If the user says he doesn't want to see any 
prompts, then we shouldn't be accepting the security prompts. That would 
lead to malicious programs doing whatever they wanted.

>
>
> diff -r 86abbf8be0b1 netx/net/sourceforge/jnlp/runtime/Boot.java
> --- a/netx/net/sourceforge/jnlp/runtime/Boot.java	Thu Jun 23 15:29:45 2011 +0200
> +++ b/netx/net/sourceforge/jnlp/runtime/Boot.java	Sun Jun 26 18:47:30 2011 +0200
> @@ -156,6 +156,9 @@
>           if (null != getOption("-Xnofork")) {
>               JNLPRuntime.setForksAllowed(false);
>           }
> +        if (null != getOption("-Xtrustall")) {
> +            JNLPRuntime.setTrustAll(true);
> +        }
>
>           JNLPRuntime.setInitialArgments(Arrays.asList(argsIn));
>
> diff -r 86abbf8be0b1 netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java
> --- a/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java	Thu Jun 23 15:29:45 2011 +0200
> +++ b/netx/net/sourceforge/jnlp/runtime/JNLPClassLoader.java	Sun Jun 26 18:47:30 2011 +0200
> @@ -519,6 +519,9 @@
>       }
>
>       private void checkTrustWithUser(JarSigner js) throws LaunchException {
> +        if (JNLPRuntime.isTrustAll()){
> +            return;
> +        }
>           if (!js.getRootInCacerts()) { //root cert is not in cacerts
>               boolean b = SecurityDialogs.showCertWarningDialog(
>                       AccessType.UNVERIFIED, file, js);
> diff -r 86abbf8be0b1 netx/net/sourceforge/jnlp/runtime/JNLPRuntime.java
> --- a/netx/net/sourceforge/jnlp/runtime/JNLPRuntime.java	Thu Jun 23 15:29:45 2011 +0200
> +++ b/netx/net/sourceforge/jnlp/runtime/JNLPRuntime.java	Sun Jun 26 18:47:30 2011 +0200
> @@ -121,6 +121,9 @@
>       /** set to false to indicate another JVM should not be spawned, even if necessary */
>       private static boolean forksAllowed = true;
>
> +    /** all security dialogs will be consumed and pretented as beeing verified by user and allowed.*/

typo here: "being"

> +    private static boolean trustAll=false;
> +
>       /** contains the arguments passed to the jnlp runtime */
>       private static List<String>  initialArguments;
>
> @@ -130,6 +133,7 @@
>       public static final String STDERR_FILE = "java.stderr";
>       public static final String STDOUT_FILE = "java.stdout";
>
> +
>       /**
>        * Returns whether the JNLP runtime environment has been
>        * initialized.  Once initialized, some properties such as the
> @@ -728,4 +732,12 @@
>           }
>       }
>
> +    static void setTrustAll(boolean b) {
> +        trustAll=b;
> +    }
> +
> +    public static boolean isTrustAll() {
> +        return trustAll;
> +    }
> +

Could you please add a javadoc comment to these two methods noting that 
they are for testing only?

>   }
> diff -r 86abbf8be0b1 netx/net/sourceforge/jnlp/security/SecurityDialogs.java
> --- a/netx/net/sourceforge/jnlp/security/SecurityDialogs.java	Thu Jun 23 15:29:45 2011 +0200
> +++ b/netx/net/sourceforge/jnlp/security/SecurityDialogs.java	Sun Jun 26 18:47:30 2011 +0200
> @@ -358,8 +358,12 @@
>           return AccessController.doPrivileged(new PrivilegedAction<Boolean>() {
>               @Override
>               public Boolean run() {
> +                if (JNLPRuntime.isTrustAll()) {
> +                    return false;

I am a little confused here. Every place that is calling this method 
(shouldPromptUser) will assume the security check failed and will not 
continue an action - with a name like trustAll, dont we want the 
security check to succeed? Would you mind explaining why this change is 
needed?

> +                }else{
>                   return Boolean.valueOf(JNLPRuntime.getConfiguration()
>                           .getProperty(DeploymentConfiguration.KEY_SECURITY_PROMPT_USER));
> +                }

Please fix the indentation.

>               }
>           });
>       }

Cheers,
Omair



More information about the distro-pkg-dev mailing list