[13] RFR JDK-8080462: Update SunPKCS11 provider with PKCS11 v2.40 support

Valerie Peng valerie.peng at oracle.com
Wed May 29 21:01:57 UTC 2019


Thanks, I have unchecked the "Source" compatibility box. Will finalize 
the CSR and wait for Joe's comments if any.

Valerie

On 5/29/2019 1:12 PM, Sean Mullan wrote:
> I agree with your comments below and the current CSR looks good so 
> I've added my name as Reviewer. One main comment is that I don't think 
> you should check the "Source" compatibility box. That would mean this 
> would be a source-incompatible change [1], which I don't think is 
> right. I don't think you should check any of the Compatibility boxes 
> as according to the "Compatibility Risk Description" box, you said 
> there is no compatibility risk.
>
> --Sean
>
> [1] https://wiki.openjdk.java.net/display/csr/Kinds+of+Compatibility
>
> On 5/29/19 3:00 PM, Valerie Peng wrote:
>> Hi Sean,
>>
>> Much thanks for the feedbacks. They are very helpful... I have 
>> updated the CSR per your feedbacks.
>>
>> https://bugs.openjdk.java.net/browse/JDK-8221442
>>
>> Please find more replies inline below.
>>
>> On 5/28/2019 1:51 PM, Sean Mullan wrote:
>>
>>> Hi Valerie,
>>>
>>> On 5/24/19 6:37 PM, Valerie Peng wrote:
>>>> Hi Sean,
>>>>
>>>> Thanks much for the suggestion. I have added the info on newly 
>>>> supported algorithms to both the CSR and the bug record. Please let 
>>>> me know if you have more comments.
>>>
>>> - In the Summary section, add a hyperlink to the PKCS#11 v2.40 
>>> standard and the errata
>>
>> Done.
>>
>>> - In general, I would put more information in the Specification 
>>> section. I think attaching a patch of all the implementation changes 
>>> is a bit too raw and not that useful as it is hard to discern what 
>>> is specification and what is not (also the patch is not currently 
>>> attached and pointing to a webrev is not acceptable per CSR rules 
>>> since it may go away). Instead, I would avoid attaching a patch and 
>>> instead include descriptions of the new attributes and algorithms in 
>>> the Specification section in a format similar to that what is 
>>> documented in 
>>> https://docs.oracle.com/en/java/javase/12/security/pkcs11-reference-guide1.html.
>>>
>>> Basically, I think this CSR should include the information that is 
>>> exposed or configurable to users outside of the implementation, 
>>> which I think can be described in 2 types of use cases:
>>
>> Yes, I think this is better. I was focusing on header file updates in 
>> original CSR. Agree that it'd be useful to list changes exposed by 
>> this RFE.
>>
>>> 1. configuring a PKCS#11 provider (need to know what attributes are 
>>> supported and their defaults)
>>
>> Well, PKCS11 reference guide uses the term "attribute" to refer to 
>> provider configuration options. This RFE did not add new provider 
>> configuration options. However, there is also attributes defined in 
>> PKCS#11 whose name starts with CKA_xxx. This RFE enhances SunPKCS11 
>> provider to recognize new PKCS#11 attributes and won't error out with 
>> exceptions when specified inside the configuration file entries as 
>> attribute values, e.g.
>>
>>     |attributes(*,CKO_PRIVATE_KEY,CKK_RSA) = { *CKA_DECRYPT* = true }|
>>
>> These newly recognized PKCS#11 attributes (CKA_xxx), mechanisms 
>> (CKM_xxx), key types (CKK_xxx), etc., are defined in 
>> src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/PKCS11Constants.java.
>>
>>> 2. using it as a provider in an application (need to know what 
>>> algorithms are supported and what is disabled/enabled by default)
>>
>> Yes, these are the list of newly supported algorithms which I have 
>> added to the CSR to address your earlier comment. None of them are 
>> disabled by default. However, only when the underlying PKCS11 library 
>> also support these, they will show up as available.
>>
>>> - Are there new attributes that are now supported than what are 
>>> currently listed in Table 5.1 of the PKCS#11 Reference Guide?: 
>>> https://docs.oracle.com/en/java/javase/12/security/pkcs11-reference-guide1.html#GUID-C4ABFACB-B2C9-4E71-A313-79F881488BB9
>>
>> If you are referring to attributes per the convention of PKCS#11 
>> reference guide, no new provider configuration attributes added. 
>> However, new PKCS#11 attributes are recognized. We don't list 
>> recognized PKCS#11 attributes in the reference guide as they are 
>> quite extensive. PKCS11 header files define a long list of constants 
>> and depending on what they are for, it may or may not lead to an 
>> error. For example, unrecognized mechanisms and error codes will be 
>> accepted and their long values are used instead. However, 
>> unrecognized PKCS#11 attributes specified in the PKCS#11 provider 
>> configuration file will lead to exception.
>>
>>> If so, I think we should list them in the Specification section with 
>>> the same details as in the Reference Guide.
>>
>> Given the above, I suppose that we don't need to list out all newly 
>> supported PKCS#11 attributes? They do impact the user in some way, 
>> but not sure if it's too much details. Perhaps we can just state that 
>> whatever supported in the PKCS#11 v2.40 headers are now recognized by 
>> SunPKCS11 provider.
>>
>>> - For the new algorithms, I would include those in the Specification 
>>> section, in a format like table 5.3 in the PKCS#11 Reference Guide: 
>>> https://docs.oracle.com/en/java/javase/12/security/pkcs11-reference-guide1.html#GUID-D3EF9023-7DDC-435D-9186-D2FD05674777
>>
>> Sure, will do.
>>
>>>
>>> - I would include any new or changed defaults for attributes, etc.
>>
>> No new defaults or new attributes for PKCS11 provider configurations.
>>
>> Regards,
>> Valerie
>>>
>>> --Sean
>>>
>>>>
>>>> All,
>>>>
>>>> RFEs need to be integrated by 6/13. Can someone help reviewing this 
>>>> soon? Mach5 run is clean. I up'ed the version of webrev to 
>>>> webrev.01 due to the additional support for RSASSA-PSS signatures.
>>>>
>>>> RFE: https://bugs.openjdk.java.net/browse/JDK-8080462
>>>> CSR: https://bugs.openjdk.java.net/browse/JDK-8221442
>>>> Webrev: http://cr.openjdk.java.net/~valeriep/8080462/webrev.01/
>>>>
>>>> Thanks,
>>>> Valerie
>>>>
>>>> On 5/22/2019 7:55 AM, Sean Mullan wrote:
>>>>> On 5/21/19 7:19 PM, Valerie Peng wrote:
>>>>>>
>>>>>> I thought we always file CSR when updating the version of 
>>>>>> external standard, e.g. documenting the import aspect of JDK.
>>>>>
>>>>> Good point though I think that was primarily based on whether the 
>>>>> external standard was referenced in the javadocs of the standard 
>>>>> APIs or influenced the behavior of existing APIs in some way. I 
>>>>> don't think PKCS#11 is referenced from any of our standard APIs, 
>>>>> but since this new version does add support for additional crypto 
>>>>> algorithms via the standard APIs that weren't previously 
>>>>> available, that sounds like a good enough reason for filing the CSR.
>>>>>
>>>>> I would recommend adding some additional details to the CSR to 
>>>>> list what new features/algorithms PKCS#11 v2.40 provides and which 
>>>>> standard APIs those features are applicable to. It would also be 
>>>>> helpful to add similar details to the main issue and the release 
>>>>> note as there aren't many details about what features are in the 
>>>>> new version.
>>>>>
>>>>> Thanks,
>>>>> Sean
>>>>>
>>>>>>
>>>>>> I'd love to close/withdraw the CSR if it's not needed.
>>>>>>
>>>>>> Thanks,
>>>>>> Valerie
>>>>>> On 5/20/2019 12:11 PM, Sean Mullan wrote:
>>>>>>> On 5/17/19 3:56 PM, Valerie Peng wrote:
>>>>>>>>
>>>>>>>> Thanks Martin for helping me troubleshoot NSS side, I added PSS 
>>>>>>>> support into PKCS11 provider and added PSS-specific regression 
>>>>>>>> tests. Please find webrev updated as below:
>>>>>>>>
>>>>>>>> http://cr.openjdk.java.net/~valeriep/8080462/webrev.01/
>>>>>>>>
>>>>>>>> Can someone help review the CSR first as the approval may take 
>>>>>>>> a week or so.
>>>>>>>
>>>>>>> I am curious why a CSR is needed? This seems to be strictly an 
>>>>>>> implementation change with no compatibility effects.
>>>>>>>
>>>>>>> --Sean
>>>>>>>
>>>>>>>>
>>>>>>>> Thanks,
>>>>>>>> Valerie
>>>>>>>> On 4/12/2019 5:05 PM, Valerie Peng wrote:
>>>>>>>>>
>>>>>>>>> Anyone has time to review this? Besides the header files 
>>>>>>>>> update, I added support for AES/GCM/NoPadding support. Ran 
>>>>>>>>> into some strange NSS error with RSASSA-PSS signature 
>>>>>>>>> mechanism, so I have not included the PSS signature impl here.
>>>>>>>>>
>>>>>>>>> RFE: https://bugs.openjdk.java.net/browse/JDK-8080462
>>>>>>>>>
>>>>>>>>> Webrev: http://cr.openjdk.java.net/~valeriep/8080462/webrev.00/
>>>>>>>>>
>>>>>>>>> CSR: https://bugs.openjdk.java.net/browse/JDK-8221442
>>>>>>>>>
>>>>>>>>> Thanks,
>>>>>>>>> Valerie
>>>>>>>>>
>>>>>>>>>



More information about the security-dev mailing list