Update mechanism for the upcoming trust store
Sean Mullan
sean.mullan at oracle.com
Fri Jan 26 21:31:29 UTC 2018
On 1/24/18 5:39 AM, Fotis Loukos wrote:
>> You may not be aware, but the JDK does currently support a mechanism for
>> blacklisting certificates. The lib/security/blacklisted.certs file
>> contains a list of the fingerprints of certificates that are explicitly
>> distrusted. If a root was compromised and added to this file it would no
>> longer be trusted.
> My biggest concern is what you describe below, the dynamic update.
>
>> However, currently there is no mechanism in OpenJDK to dynamically
>> update that file. While I think there is merit in implementing something
>> like that, many challenges would need to be addressed as part of that,
>> for example, where and how does this file get updated, how is it
>> verified, etc.
> The verification step can be implemented as described above. I think
> that the update step requires some design, but I don't think it is that
> difficult. For example, a naive algorithm such as every Monday plus a
> random number of days/hours/minutes in order to avoid heavy traffic
> during the update period would be good for starters. As a first step to
> try a new format, you could even fetch it once during installation and
> provide a means for the user to update it manually.
One thing we could potentially do initially is to provide a stable https
URL where an updated blacklist could be downloaded, something like what
Mozilla does for OneCRL [1]. This would be an initial step, not the
whole solution of course, but it at least would allow someone to quickly
update their JDK should a certificate need to be distrusted ASAP.
Let me look into that a bit.
I think implementing a dynamic solution is more challenging and would
require more design/review, etc but feel free to provide more details on
any additional thoughts or design sketches you might have.
--Sean
[1]
https://firefox.settings.services.mozilla.com/v1/buckets/blocklists/collections/certificates/records
More information about the security-dev
mailing list