JEP 411, removal of finalizers, a path forward.
Peter Firmstone
peter.firmstone at zeus.net.au
Tue Aug 3 00:28:51 UTC 2021
Hello Andrew,
Loss of SM is a significant threat to my software, if left unresolved.
Your interpretations are your own, I make no apologies for your
interpretation. I am describing the difficulties that I am experiencing
with JEP 411 migration and how it applies to my situation, it appears
that others are having difficulties that they have also expressed on
OpenJDK lists, please understand that it is not a trouble free
experience, and as such some of my frustrations may leak through into my
writing. In my world, more developers are affected, than are
unaffected, but those are my associations, not yours, your experiences
may differ from mine.
What I have stated, is that existing deployed software that uses SM for
authorization access controls, has been designed around SM and will
become insecure if SM is removed. I refer you to the following book,
which our software security architecture is designed around, I have not
done research on the number of developers or projects affected (I do not
have the time or resources). I do see quite a number of developers from
various projects have stated they will be affected in some way or
another on OpenJDK lists, have you followed any up off list, to
understand how they're impacted? Or have you written them off as
/special case/ /special loss/ ?
https://www.oracle.com/java/technologies/javaee/api-design-implementation.html
In JGDMS without SM, at least the following must be addressed to
maintain security:
1. TLS and Kerberos connections cannot be established. (My software is
littered with doPrivileged calls that preserve the Subject, we don't
have anon TLS connections, we require client certificates).
2. All remote connections are authorized to load classes.
3. All remote connections are authorized to perform deserialization.
This doesn't take into account user authorization, with SM gone, it also
means that all users and services now have all privileges. I'm only
documenting the major ones here.
With SM all the above require authorization and authentication, such
that all remote connections are trusted and without malicious intent.
I have also presented a number of different compromises, that I thought
might address some of the maintenance cost burdens around SM OpenJDK
has, so that we might retain the most expensive components to replace.
Having established that OpenJDK is not yet willing to compromise, I have
been attempting to create an authorization layer using Agents, so that I
can restore perimeter security following the removal of SM and support
future versions of Java. It is my hope that either I will be
successful in recreating an authorization layer, or that enough people
come forward and OpenJDK decides there are enough affected developers to
find a compromise that either makes migration practical, or less expensive.
I have previously offered to donate code to OpenJDK, but I was unable to
get clarification on whether I could include AL2.0 licensed code from
other authors, as my code is not my sole works, two of whom have since
passed away (only one at the time). The remaining authors, I can still
get in touch with and request them to sign a contributor agreement,
which I myself have signed. I can separate out the parts which I am
the sole author. For example my RFC 3986 & RFC 5952 URI implementation
is derived from Apache Harmony under AL2.0. This work has been in
production for many years, and had no issues with the modules added in
Java 9, which allowed me to use common policy files in my tests for all
supported Java versions. It's used in both a ClassLoader and a Policy
implementation to avoid unnecessary DNS calls. I have noticed that
OpenJDK contains code under the AL2.0 license.
This has been a very frustrating experience, I'd suggest, if you haven't
got anything of value to add, or cannot be part of the solution, please
don't become part of the problem. I'm doing the best I can to work
within constraints to find a solution and am trying not to be part of
the problem by allowing my frustration leak through, I've deleted more
than I've posted, I suggest you do the same and direct your attack onto
problems, rather than people.
Thank you.
Peter.
On 2/08/2021 11:07 pm, Andrew Dinn wrote:
> On 02/08/2021 11:33, Peter Firmstone wrote:
>> I think you may be misinterpreting my comment, let me clarify:
>
> Really? I'd suggest only if you stretch the meaning of your words
> beyond their elastic limit.
>
>> I'm assuming that during the process of removal of security manager,
>> any external ports or process hooks that we can only turn off now by
>> not granting a permission will be replaced by a command line property
>> or something similar? Eg, Agents, Management, etc. If this is the
>> case, it would be nice if they were set to off by default, such that
>> they needed to be enabled from the command line. It's a suggestion.
>> . . .
> They might be or they might not be replaced -- and, indeed, you are
> welcome to help the project to make that a possibility. However, even
> if they were not replaced or enabled as default behaviours the
> platform would not fail to be 'secure by default'. At worst, it might
> be lacking belt and braces when it comes to available means for
> enforcing some specific forms of control over execution -- controls
> that can be used to resolve some security problems, but not
> exclusively. Yet, you keep using language that implies the loss of the
> security manager is a significant threat to the security of OpenJDK/Java.
>
> Claiming now that all you meant was that you would like to have APIs
> that give you similar mechanisms to what is being removed does not was
> and will not validate the use of such exaggerated language. Nor do
> such statements give anyone confidence that you are able to identify
> clear and compelling requirements and assess the effort that might be
> needed to satisfy them and maintain an implementation.
>
> So, maybe you should just stop making out that your concerns are a
> major problem to most developers and that they threaten the integrity
> of the platform and instead concentrate on identifying simple and
> maintainable APIs that we can feasibly add to OpenJDK without
> incurring an unjustifiable maintenance burden.
>
> regards,
>
>
> Andrew Dinn
> -----------
> Red Hat Distinguished Engineer
> Red Hat UK Ltd
> Registered in England and Wales under Company Registration No. 03798903
> Directors: Michael Cunningham, Michael ("Mike") O'Neill
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.openjdk.org/pipermail/security-dev/attachments/20210803/422a5851/attachment.htm>
More information about the security-dev
mailing list