RFR CSR for 8162628: Migrating cacerts keystore to password-less PKCS12 format

Weijun Wang weijun.wang at oracle.com
Fri May 31 09:43:06 UTC 2019


It's not easy to find out the word difference after a CSR edit.

But you changed

   everyone (yes, everyone) has been loading cacerts with a null password and they are able to read all certificate inside.

to

   everyone (yes, everyone) who loads cacerts with a null password is able to read all certificates inside.

I *did* mean that *everyone* is using the null password. Did you not?

--Max


> On May 31, 2019, at 4:27 PM, Langer, Christoph <christoph.langer at sap.com> wrote:
> 
> Hi Max,
> 
> I've already made some updates to the wording in the CSR.
> 
> In the specification section, it should probably also not mention the source location src/java.base/share/lib/security/cacerts as it is about to be eliminated by JDK-8193255. It should rather refer to <JDK>/lib/security/cacerts, I think.
> 
> Best regards
> Christoph
> 
>> -----Original Message-----
>> From: security-dev <security-dev-bounces at openjdk.java.net> On Behalf Of
>> Weijun Wang
>> Sent: Freitag, 31. Mai 2019 05:33
>> To: security-dev at openjdk.java.net
>> Subject: RFR CSR for 8162628: Migrating cacerts keystore to password-less
>> PKCS12 format
>> 
>> Please review the CSR at
>> 
>>   https://bugs.openjdk.java.net/browse/JDK-8224891
>> 
>> (Oh, I hate the CSR having a different bug id.)
>> 
>> Basically, with this change, the cacerts file can be loaded with
>> 
>>   KeyStore.getInstance("JKS" or "PKCS12").load(stream, null or anything) or
>>   KeyStore.getInstance(new File("cacerts"), null or anything)
>> 
>> so hopefully all your old code should still work.
>> 
>> I've also opened another RFE [1] that intends to find a different way to tag
>> jdkCA entries in cacerts other than appending "[jdk]" to the alias.
>> 
>> Thanks,
>> Max
>> 
>> [1] https://bugs.openjdk.java.net/browse/JDK-8225099
> 




More information about the security-dev mailing list