RFR [14] 8214483: Remove algorithms that use MD5, DES, or ECB from security requirements
Mike StJohns
mstjohns at comcast.net
Fri Nov 8 00:41:41 UTC 2019
You deleted DES but not DESede. Was that intentional?
Sent from my iPad
> On Nov 7, 2019, at 17:12, Sean Mullan <sean.mullan at oracle.com> wrote:
>
> Ok, I have put back the Cipher algorithms with ECB mode that I had previously removed (except for DES/ECB which is still removed).
>
> Updated webrev: https://cr.openjdk.java.net/~mullan/webrevs/8214483/webrev.01/
>
> --Sean
>
>> On 11/6/19 5:43 PM, Michael StJohns wrote:
>>> On 11/6/2019 11:27 AM, Sean Mullan wrote:
>>> Please remove this change to remove the Java SE requirements to implement security algorithms based on DES, MD5, or ECB. It makes sense to periodically review these requirements and remove algorithms or modes that are known to be weak and of which usage has declined significantly and thus compatibility risk is much lower.
>>>
>>> Note that we are not removing the actual implementations of these algorithms from the JDK. This just means that an SE implementation is not required to support these algorithms.
>>>
>>> webrev: https://cr.openjdk.java.net/~mullan/webrevs/8214483/webrev.00/
>>> CSR: https://bugs.openjdk.java.net/browse/JDK-8233607
>>>
>>> Thanks,
>>> Sean
>>>
>> I don't have a problem with removing DES or MD5 from the must-implement list, but ECB is a fundamental building block mode. It's going to be how you implement a new mode before there's specific support for that mode. Pretty much any mode can be implemented using ECB as its only real crypto operation. E.g. CBC, CTR, CCM, GCM, CFB, OFB etc are all wrapped around ECB in some form. Please continue to require that it be implemented. Policy MAY restrict the use of the mode for a given key, but that's a provider issue.
>> Mike
More information about the security-dev
mailing list