[EXTERNAL] Re: New candidate JEP: 451: Prepare to Disallow the Dynamic Loading of Agents
Bruno Borges
Bruno.Borges at microsoft.com
Fri May 12 21:12:16 UTC 2023
That's odd, Alex.
I can confirm that when I run this application, I do get the App Insights agent enabled, and I get telemetry. I can confirm that the jdk.attach.allowAttachSelf is 'null' when the application runs (therefore, the setting is not being configured from anywhere in the environment).
I am running with MS Build of OpenJDK, which I can confirm we have not made any changes to this setting. Therefore, it is what OpenJDK vanilla has.
________________________________
From: Alex Buckley <alex.buckley at oracle.com>
Sent: May 12, 2023 1:43 PM
To: Bruno Borges <Bruno.Borges at microsoft.com>
Cc: jdk-dev at openjdk.org <jdk-dev at openjdk.org>
Subject: Re: [EXTERNAL] Re: New candidate JEP: 451: Prepare to Disallow the Dynamic Loading of Agents
Hi Bruno,
On 5/12/2023 12:31 PM, Bruno Borges wrote:
> I am using OpenJDK 17 and I am enabling the Azure Application Insights
> agent programmatically (see [1]).
Thank you for the explanation.
> The reason I like this approach is because I can manage the Java Agent
> as a regular Maven Dependency, and get alerts on updates (or,
> knock-on-wood, security updates).
>
> As far as I recall 'jdk.attach.allowAttachSelf=true' is the case in JDK
> 11 and 17.
Per the JDK 9 release notes
(https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.oracle.com%2Fjava%2Ftechnologies%2Fjavase%2F9-all-relnotes.html%23JDK-8178380&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ClsJoDTDYztjAHEa%2BqirMcKN6g7AD82dm6%2BFyNz9MdE%3D&reserved=0<https://www.oracle.com/java/technologies/javase/9-all-relnotes.html#JDK-8178380>),
self-attach is disallowed by default in 9+. The Azure infrastructure
that's running your code on 17 must be setting the flag behind the
scenes. In that case, I would expect the infrastructure to let you
choose, in future, whether to allow dynamic agent loading, and to pass
-XX:+Enable... behind the scenes too.
Alex
> ------------------------------------------------------------------------
> *From:* Alex Buckley <alex.buckley at oracle.com>
> *Sent:* May 12, 2023 12:18 PM
> *To:* Bruno Borges <Bruno.Borges at microsoft.com>
> *Cc:* jdk-dev at openjdk.org <jdk-dev at openjdk.org>
> *Subject:* [EXTERNAL] Re: New candidate JEP: 451: Prepare to Disallow
> the Dynamic Loading of Agents
> Bruno,
>
> Am I right to assume that these cases involve applications running on
> Java 8? If they were on 9+, the developers would already have had to run
> with `-Djdk.attach.allowAttachSelf=true` to let the app load the agent
> into the local JVM.
>
> I sense that you're describing an 8 environment for two reasons:
>
> 1. Because command line options were relatively rare in that
> environment, and mostly concerned JVM tuning when they did appear. But
> in the 9+ environment, it's relatively common to use command line
> options (esp. --add-opens) because some library four levels down in the
> app demands to use private methods in java.lang.
>
> 2. Because you rightly look "forward" to jlink to see if it can smooth
> the 8->11 / 8->17 / 8->21 migration, by having the image automatically
> enable agents without any app developer learning new flags.
>
> Apologies if I've misinterpreted your use cases, but I really want to
> understand the reticence around more-command-line-options.
>
> Alex
>
> On 5/11/2023 2:55 PM, Bruno Borges wrote:
>> Ron,
>>
>> In the cases I've seen, it is the application that is loading the agent
>> programmatically, first thing they do in their static_void_main method.
>>
>> This has some benefits like allowing the application to depend on an
>> agent as they do with any other library, through a dependency management
>> tool (Maven/Gradle), and having more easily version upgrading mechanisms.
>>
>> The -javaagent deployment model is not an option to this, nor is the
>> flag to enable the programmatically approach, as it requires the
>> application *developer* to tune JVM flags to do so.
>>
>> Only possible solution I thought about was to give jlink a flag that
>> would enable the feature. I wonder if this has been considered.
>>
>> Sent from mobile device.
>> ------------------------------------------------------------------------
>> *From:* jdk-dev <jdk-dev-retn at openjdk.org> on behalf of Ron Pressler
>> <ron.pressler at oracle.com>
>> *Sent:* Thursday, May 11, 2023 11:37:56 AM
>> *To:* Jack Shirazi <jacks at fasterj.com>
>> *Cc:* jdk-dev at openjdk.org <jdk-dev at openjdk.org>
>> *Subject:* [EXTERNAL] Re: New candidate JEP: 451: Prepare to Disallow
>> the Dynamic Loading of Agents
>> The general policy in effect since JEP 261 [1] was delivered in JDK 17
>> (and included the dynamic agents change) is that the application and not
>> libraries gets to decide what encapsulation-bypassing mechanisms are
>> allowed. In the case of agents, JEP 451 states:
>>
>>> To ensure that the owner of an application approved the use of agents, JDK 5 required agents to be specified on the command line with the -javaagent or -agentlib options, and loaded the agents immediately at startup. This represented an explicit grant of privileges by the application owner.
>>
>> This is in line with the policy; letting libraries decide that they want
>> to deploy an encapsulation-bypassing agent without the applications
>> explicit consent is not. The full motivation behind the policy, and what
>> integrity (not to be confused with security) means, is explained in this
>> information JEP draft:
>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F8305968&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=89gZN5iOEQseAXIfUql56cHPjMn8zqaSCjdcrzQOUpw%3D&reserved=0<https://openjdk.org/jeps/8305968> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F8305968&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=89gZN5iOEQseAXIfUql56cHPjMn8zqaSCjdcrzQOUpw%3D&reserved=0<https://openjdk.org/jeps/8305968>> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F8305968&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=89gZN5iOEQseAXIfUql56cHPjMn8zqaSCjdcrzQOUpw%3D&reserved=0 <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F8305968&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=89gZN5iOEQseAXIfUql56cHPjMn8zqaSCjdcrzQOUpw%3D&reserved=0<https://openjdk.org/jeps/8305968>>>
>>
>> [1]:
>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F261&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=QuqJW1%2FrIcs547KzXzzwmGtLB0wfn08VFtn60tSsXfc%3D&reserved=0<https://openjdk.org/jeps/261> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F261&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=QuqJW1%2FrIcs547KzXzzwmGtLB0wfn08VFtn60tSsXfc%3D&reserved=0<https://openjdk.org/jeps/261>> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F261&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=QuqJW1%2FrIcs547KzXzzwmGtLB0wfn08VFtn60tSsXfc%3D&reserved=0 <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F261&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=QuqJW1%2FrIcs547KzXzzwmGtLB0wfn08VFtn60tSsXfc%3D&reserved=0<https://openjdk.org/jeps/261>>>
>>
>>> On 11 May 2023, at 11:11, Jack Shirazi <jacks at fasterj.com> wrote:
>>>
>>> This proposes to deprecate one mechanism for agent loading, but the ability to run an agent in the JVM is unchanged. This means that if disallowed in future, there will still be absolutely no change in "the balance between serviceability, which involves ad-hoc changes to running code, and integrity, which assumes that
> running
>> code is not arbitrarily changed". Applying the deprecation will still
>> leave the exact same ability for arbitrary changes to the code.
>>>
>>> For libraries that may use this mechanism, I checked the https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvekey.cgi%3Fkeyword%3Djava&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=17Adm4CquRMW%2B%2Ba1UCiGh%2BcjvAL%2FVN1AfRCcI8M7ivg%3D&reserved=0<https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=java> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvekey.cgi%3Fkeyword%3Djava&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209886851539%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=17Adm4CquRMW%2B%2Ba1UCiGh%2BcjvAL%2FVN1AfRCcI8M7ivg%3D&reserved=0<https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=java>> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvekey.cgi%3Fkeyword%3Djava&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209887007838%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=tFg523WVNJJ1e1iQAHYOzSntwQJjBZE0bPXyfbGxzNg%3D&reserved=0 <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcve.mitre.org%2Fcgi-bin%2Fcvekey.cgi%3Fkeyword%3Djava&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209887007838%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=tFg523WVNJJ1e1iQAHYOzSntwQJjBZE0bPXyfbGxzNg%3D&reserved=0<https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=java>>> CVEs for the last five years and can't find any recorded abuse of it. I find it hard to believe that developers wouldn't know that their dependencies use this, if they do.
>>>
>>> Ultimately, integrity may be preferred, but there is a balance. For example we are not proposing to remove java agent capability, reflection, dynamic class loading, etc, all of which in one way or another violate integrity, because these are features which make the JVM hugely successful.
>>>
>>> I don't see the benefit here. What future improvement would happen if the deprecation is subsequently applied?
>>>
>>> On 08/05/2023 20:17, Mark Reinhold wrote:
>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F451&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209887007838%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RINCIv278SarKlKGQWZ9wn7mJRVVYpE4UIjU%2FqW9RIE%3D&reserved=0<https://openjdk.org/jeps/451> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F451&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209887007838%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RINCIv278SarKlKGQWZ9wn7mJRVVYpE4UIjU%2FqW9RIE%3D&reserved=0<https://openjdk.org/jeps/451>> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F451&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209887007838%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RINCIv278SarKlKGQWZ9wn7mJRVVYpE4UIjU%2FqW9RIE%3D&reserved=0 <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fopenjdk.org%2Fjeps%2F451&data=05%7C01%7CBruno.Borges%40microsoft.com%7C2f508f0907a747f2beea08db53297d25%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195209887007838%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=RINCIv278SarKlKGQWZ9wn7mJRVVYpE4UIjU%2FqW9RIE%3D&reserved=0<https://openjdk.org/jeps/451>>>
>>>>
>>>> Summary: Issue warnings when agents are loaded dynamically into a
>>>> running JVM. These warnings aim to prepare users for a future release
>>>> which disallows the dynamic loading of agents by default in order to
>>>> improve integrity by default. Serviceability tools that load agents at
>>>> startup will not cause warnings to be issued in any release.
>>>>
>>>> - Mark
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.openjdk.org/pipermail/jdk-dev/attachments/20230512/c3ae6578/attachment-0001.htm>
More information about the jdk-dev
mailing list