PKCS #11 provider shutdown process, key zeroization

Milton Smith milton.smith at oracle.com
Mon Mar 18 14:11:31 PDT 2013


Hi Matthew,

I reached out to you outside this list not long ago.  We have not forgot about you.  ;o)

Can you quickly enumerate your concerns (#1, #2, etc)?  They seem mostly related to zeroization.  I just want to be sure we capture all your concerns and don't miss any.

Regards,
Milton

On Mar 18, 2013, at 1:05 PM, Matthew Hall <mhall at mhcomputing.net> wrote:

> Hello,
> 
> Can anyone please respond to my feedback on the PKCS #11 provider? It's been 
> one month since I posted about several potential issues with the code. I would 
> like to hear from someone with the necessary expertise. The OpenJDK process 
> isn't very community-friendly if nobody will try to reply.
> 
> Thanks,
> Matthew Hall.
> 
> On Tue, Feb 19, 2013 at 04:59:29PM -0800, Matthew Hall wrote:
>> I found another issue related to this topic.
>> 
>> Quite a number of bits of code are printing out the content of the private 
>> exponent of the RSA Private Keys by default into the toString() output, which 
>> could lead to key compromise if they're printed into a log.
>> 
>> share/classes/sun/security/pkcs11/P11Key.java:552:            sb.append("\n  private exponent: ");
>> share/classes/sun/security/pkcs11/P11Key.java:624:            sb.append("\n  private exponent: ");
>> share/classes/sun/security/rsa/RSAPrivateCrtKeyImpl.java:238:        sb.append("\n  private exponent: ");
>> share/classes/sun/security/rsa/RSAPrivateKeyImpl.java:105:                + n + "\n  private exponent: " + d;
>> 
>> Ordinarily I believe FIPS and PCI would require that there isn't any code 
>> sitting around that could accidentally or unexpectedly print out the private 
>> key data. Is this toString() behaving that way for a good reason?
>> 
>> Matthew.



More information about the security-dev mailing list