Code signing [Was: JEP draft: Prepare to Restrict The Use of JNI]
Alan Bateman
Alan.Bateman at oracle.com
Wed Sep 6 09:06:10 UTC 2023
On 06/09/2023 09:51, Mario Torre wrote:
> :
> Not answering for Andrew, but I think that tying access control to a
> cryptographically signed binary rather than a command line flag seems
> more robust, it shift the knowledge of the launcher (granting the
> privileges to the modules it knows) toward the actual library
> (granting the privileges to the modules that are signed), it also work
> well within FIPS environments since then additional restrictions can
> be implemented if necessary (like only trusting certain algorithms
> etc..).
>
> You are right it's a different kind of configuration, but it seems
> worthy of being considered.
>
Andrew is right that the JDK is waist deep in crypto but aside from
validating signatories it doesn't have everything needed to ensure
trust, at least not like the infrastructure that Java Web Start had in
Oracle JDK to JDK 8.
Signing did come up in the previous commotion around taming agents but
not seriously due to the challenges establishing trust, and all
complexity and usability issues that go with signing. There were also
concerns building open source projects that would need to be signed.
-Alan
More information about the jdk-dev
mailing list