[External] : Re: JEP411: Missing use-case: Monitoring / restricting libraries

Peter Firmstone peter.firmstone at zeus.net.au
Thu May 6 06:17:22 UTC 2021


On 21/04/2021 10:38 pm, Ron Pressler wrote:
>
> There is no argument that this is a powerful capability *in theory*;
> the problem is that it’s difficult to correctly employ this capability 
> correctly *in practice*. See
> this paper for an empirical study: 
> http://www.cs.cmu.edu/~clegoues/docs/coker15acsac.pdf 
> <http://www.cs.cmu.edu/~clegoues/docs/coker15acsac.pdf>
>
It's a shame the authors weren't able to study an application that 
really ran the security manager through it's paces.  They do exist, for 
example Apache River isn't on the list, neither is Rio or Sorcer.   
These certainly aren't perfect, my project on github, JGDMS was created 
to demonstrate the security fixes for issues in Apache River, to 
convince users who were not receptive to addressing security problems.

I've added it here since security seems to be a popular discussion 
point, so that I can show where SecurityManager, AccessController, 
Policy etc, fit into our overarching security model.

Back when Apache inherited the Jini source code from Sun Microsystems, 
the designers had made the assumption that Java Serialization was 
secure, due to the sandbox.  Maybe Java Serialization and the sandbox 
should have been securem but like most things they were designed with 
flaw's.  One of the problems was that security was added in Jini 2.0, 
while Jini 1.0 had no security at all.  At that time security was bolted 
on feature and hadn't been completed when it shipped.

So on the assumption that Java had a secure sandbox, the Jini developers 
allowed code to be downloaded dynamically, then data deserialized into 
it, then they would check to see if the proxy was valid using a 
mechanism called proxy trust, where the asked the remote end to validate 
the proxy.   They did have TLS connections, and they had constraints to 
ensure that you didn't use an insecure connection, however the problem 
was, these things were applied after downloading and deserializing!   
The other problem was that the calling Subject wasn't always preserved 
over threads, so code using secure connections didn't work the same as 
insecure TCP connections.

I think you can see the problem here and I think this is the problem 
people are talking about when they are talking about sandboxes.

I have spent years refactoring this code from the ground up, while 
trying to maintain backward compatibility as best as possible.  If you 
think Java developers are fussy about backward compatibility, you 
haven't met a Jini or Javaspace developer, but I can't blame them 
because they were subject to the horrors of Java Serialization and code 
written prior to the Java Memory Model that shipped with Java 5.

So security was broken, I took it upon myself to fix it, and the users 
didn't believe it was broken or insecure as they had drunk the sandbox 
coolaid, this is why I don't talk about sandboxing. One user even 
suggested that I use the broken ProxyTrust security mechanism to fix the 
security issues.  At that time before 2010, it wasn't common knowledge 
among developers that Java Serialization was insecure, there were some 
reports, and IBM had discussed and published information on 
whitelisting, or look ahead serialization.

I had to redesign the system, but still allow it to run insecurely for 
testing or for users who used it behind firewalls and didn't want 
security features.  It had been originally designed to be configurable, 
such that it can be configured secure, or configured insecure, and it's 
quite obvious which is which.  It doesn't use configuration files, but 
instead a Java syntax or Groovy.

I won't go into all the things that were required for security, but I 
will say that now a TLS connection is made first (with both client and 
server authentication), then we download the code, dynamically grant 
permissions to it, then de-serialize into it the ClassLoader created for 
it, that ClassLoader remains with the communication endpoint and makes 
all class resolution decisions. We don't use Java Serialization anymore 
either, instead we use constructors with a caller sensitive parameter, 
that's been discussed here previously, but it is capable of checking 
intra object invariants.

So we don't rely on sandboxing, or the sandbox, but we authenticate, 
validate and limit permissions to the principle of least privilege, as 
part of an overarching security strategy.

Here's an example of the requested permissions in downloaded code (note 
JRMP is only there for backward compatibility, it is deprecated).

https://github.com/pfirmstone/JGDMS/blob/trunk/JGDMS/services/reggie/reggie-dl/src/main/resources/META-INF/PERMISSIONS.LIST

You can see from the attached file it was granted very few permissions 
at runtime (in case anyone is wondering the md5 checksum is deprecated, 
but still used in the test suite):

All these permissions were granted dynamically, they didn't exist prior 
to the connection with the remote server, they don't exist in a policy 
file, policy files used don't often require editing.


grant codebase 
"httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77"
{
     permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
     permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", 
"connect,resolve";
};

grant codebase 
"httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77",
     principal javax.security.auth.x500.X500Principal "CN=Tester"
{
     permission javax.security.auth.AuthPermission "getSubject";
     permission org.apache.river.api.io.DeSerializationPermission 
"MARSHALL";
     permission net.jini.security.AuthenticationPermission 
"javax.security.auth.x500.X500Principal \"CN=Tester\" peer 
javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
     permission net.jini.security.AuthenticationPermission 
"javax.security.auth.x500.X500Principal \"CN=Tester\" peer 
javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
     permission net.jini.security.AuthenticationPermission 
"javax.security.auth.x500.X500Principal \"CN=Tester\" peer 
javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
     permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", 
"connect,resolve";
     permission java.net.SocketPermission 
"[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
     permission java.net.SocketPermission 
"[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
     permission java.util.PropertyPermission 
"org.apache.river.reggie.enableImplToStubReplacement", "read";
};

Prior to downloading and after authentication, a permission called 
DownloadPermission, which should really be called ClassLoadingPermission 
is granted dynamically, as well as permission to connect to the remote 
network endpoint as well as a URLPermission.  These aren't shown here as 
they are part of the ProtectionDomain's permission list.  It's a given 
that these will be granted dynamically when a ClassLoader is created to 
load the code.   Then the permissions in the PERMISSIONS.LIST file will 
be granted after class loading, if the user or calling code has 
GrantPermission to do so.  A UI may also be included that provides a 
user interface for users to interact with the service.

So as you can see, we don't rely on the sandbox and we don't trust Java 
Serialization.  We have our own serialization implementation, we haven't 
disabled Java serialization, but it is recommended the user do so with a 
global filter.

It may sound complex, but it is an automated process with tools that 
allow it to occur.

The code doesn't require many permissions to run, so it isn't given any 
more than needed.

Once the SecurityManager has been removed, I'm assuming that the 
downloaded code from our trusted third party, will be able to access 
files and data should they want to, anything the process has access to 
at least.  Of course there are a lot of places in our API's where 
security checks occur and these would no longer restrict access.

This is why I refer to SecurityManager an access control mechanism and I 
don't refer to it a sandbox.  It is a very good access control mechanism 
and it supplements type safety, class verification, object encapsulation.

It is part of our overarching security infrastructure, but most 
certainly by itself, it is not responsible for security.

Our system is dynamic, the problems mentioned regarding library changes 
are not an issue, these are simply updated when a new library (or a new 
version of Java) is deployed.

I hope this helps provide an understanding.

For those that aren't aware, Jini was meant to allow Java to cluster 
dynamically, to dynamically discover services in the network, now people 
then didn't get it, but it's very similar to microservices.  Javaspaces 
is a distributed database.   There were problems with IPv4 and NAT (Jini 
requires end to end connectivity, not a publish subscribe model), 
security and complexity that prevented Jini from taking off.  Today all 
these problems are solved, you'll notice we use IPv6 for end to end 
connectivity.

So we have all these tools built on top of Java that allow you to do 
security properly.  Java 1.4 Security implementations were actually 
changed to allow Dynamic Permission's for Jini.

Sun owned the copyright, I think Oracle may still do so, it was donated 
under the Apache 2.0 License, I have kept the code change history going 
back to the original donation, I would certainly donate anything I have 
done to OpenJDK (and I am responsible for the majority of the security 
changes), should they wish to use it, it would require Oracle to donate 
the original code as GPL to OpenJDK.

The easiest way of thinking about it, is it's the glue that ties 
together multiple JVM's on multiple servers to act as a single system, 
that discovers components dynamically as they are added and upgraded.  
It is an extremely capable and well designed system, now that the major 
issues have been solved.  Every thing is POJO domain driven design in Java.

There's a common misconception it uses RMI, it doesn't, it uses 
something far better.

Distributed Object garbage collection works (properly without race 
conditions) over secure network connections and user Subjects are 
preserved over network calls.  RMI doesn't have that capability, it's 
also extensible, so it can use different communication layers, different 
serialization layers, different transport layers, it's all configurable 
and pluggable.  Using IPv6, it can also communicate and discovery 
globally, so a system can be spread around different part of the world 
and tie together into one system.

It's scalable and damn fast too, while it does block waiting for network 
replies, it doesn't have any hotspots, the hotspot's are all Java 
platform code :)

https://pfirmstone.github.io/JGDMS/old-static-site/images/River-internet_mahalo_randomStressTest.PNG 
(This old screenshot is back when we were still using Java 
Serialization.  I'll have to do a comparison for with secure code, this 
was using unsecured communication.)  Today we use the latest TLSv1.3 
features and protocols.

You could say it was the first IoT, but now, it is far more powerful, 
more secure and capable than IoT.  We've had 20 years to figure it out.  
It is still under active development.   The current focus is a public 
Serialization API that will work with Java's module system, without 
breaking Object encapsulation. Although part of this depends on 
SecurityManager Permissions.

Once SecurityManager is removed, that is the last version of Java we 
will support, we will no longer be able stay with you until we figure 
out how to fix access control, however I fear that this functionality 
can only be provided at the Java platform level. This is basically a 
toolkit, most users are developers from large corporations who don't 
publicly share their implementations, but there are a few:

http://river.apache.org/user-doc/success-stories.html

-- 
Regards,
  
Peter Firmstone
Zeus Project Services Pty Ltd.

-------------- next part --------------
grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jinitests.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission javax.security.auth.AuthPermission "getSubject";
    permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\java", "execute";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\reggie\\reggie.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\starter\\starter.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultnonactvm.policy", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultsecurereggie.policy", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\dynamic-policy.properties", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\phoenix.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\reggie.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\tester.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\truststore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\resources\\jinitest.policy", "read";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
    permission net.jini.security.GrantPermission "net.jini.security.AuthenticationPermission \"javax.security.auth.x500.X500Principal \\\"CN=Tester\\\" peer javax.security.auth.x500.X500Principal \\\"CN=Reggie\\\"\", \"connect\";";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
    permission java.net.SocketPermission "localhost:0", "listen,resolve";
    permission java.net.SocketPermission "localhost:9080", "listen,resolve";
    permission java.net.SocketPermission "localhost:9081", "listen,resolve";
    permission java.net.SocketPermission "localhost:9082", "listen,resolve";
    permission java.util.PropertyPermission "/", "read";
    permission java.util.PropertyPermission "HOST", "read";
    permission java.util.PropertyPermission "activation.jar", "read";
    permission java.util.PropertyPermission "bouncy-jce.jar", "read";
    permission java.util.PropertyPermission "bouncy-jsse.jar", "read";
    permission java.util.PropertyPermission "classserver.jar", "read";
    permission java.util.PropertyPermission "collections.jar", "read";
    permission java.util.PropertyPermission "destroy.jar", "read";
    permission java.util.PropertyPermission "disco.jar", "read";
    permission java.util.PropertyPermission "fiddler-dl.jar", "read";
    permission java.util.PropertyPermission "fiddler.jar", "read";
    permission java.util.PropertyPermission "file.ext", "read";
    permission java.util.PropertyPermission "globalclasspath", "read";
    permission java.util.PropertyPermission "group.jar", "read";
    permission java.util.PropertyPermission "high-scale-lib.jar", "read";
    permission java.util.PropertyPermission "java.class.path", "read";
    permission java.util.PropertyPermission "java.home", "read";
    permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
    permission java.util.PropertyPermission "java.util.logging.config.file", "read";
    permission java.util.PropertyPermission "jeri.jar", "read";
    permission java.util.PropertyPermission "jgdms-rmi-tls.jar", "read";
    permission java.util.PropertyPermission "jiniClassServer.adminName", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.dir", "read";
    permission java.util.PropertyPermission "jiniClassServer.dir.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.impl.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.port", "read";
    permission java.util.PropertyPermission "jiniClassServer.port.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "jiniClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.type", "read";
    permission java.util.PropertyPermission "jiniClassServer.type.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.type.1", "read";
    permission java.util.PropertyPermission "jsk-dl.jar", "read";
    permission java.util.PropertyPermission "jsk-lib.jar", "read";
    permission java.util.PropertyPermission "jsk.iiop.jar", "read";
    permission java.util.PropertyPermission "jsk.jrmp.jar", "read";
    permission java.util.PropertyPermission "jsk.pref.jar", "read";
    permission java.util.PropertyPermission "jsk.url.jar", "read";
    permission java.util.PropertyPermission "loader.jar", "read";
    permission java.util.PropertyPermission "mahalo-dl.jar", "read";
    permission java.util.PropertyPermission "mahalo.jar", "read";
    permission java.util.PropertyPermission "mercury-dl.jar", "read";
    permission java.util.PropertyPermission "mercury.jar", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.adminName", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.impl", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.instances", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.1", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.1", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.1", "read";
    permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.adminName", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.classpath", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.classpath.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.codebase", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.codebase.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.impl.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.integrityhash", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.integrityhash.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.policyfile", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.policyfile.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvm", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvm.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.transient.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type.1", "read";
    permission java.util.PropertyPermission "norm-dl.jar", "read";
    permission java.util.PropertyPermission "norm.jar", "read";
    permission java.util.PropertyPermission "org.apache.river.jsk.home", "read";
    permission java.util.PropertyPermission "org.apache.river.jsk.port", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9080", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9081", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.globalvmargs", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.integrityhash", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.runjiniserver", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.runkitserver", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.securityproperties", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.serviceMode", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.shared", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.startDelay", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.testClassServer", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.home", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.port", "read";
    permission java.util.PropertyPermission "org.apache.river.test.home", "read";
    permission java.util.PropertyPermission "org.apache.river.test.port", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actClasspath", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actCodebase", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntLeaseExp", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntNotify", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTListener", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTSrvcLeaseExp", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.nInstancesPerClass", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.outputRoot", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.policy", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.rmiCodebase", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.selectMethod", "read";
    permission java.util.PropertyPermission "outrigger-dl.jar", "read";
    permission java.util.PropertyPermission "outrigger-snaplogstore.jar", "read";
    permission java.util.PropertyPermission "outrigger.jar", "read";
    permission java.util.PropertyPermission "phoenix-common.jar", "read";
    permission java.util.PropertyPermission "phoenix-dl.jar", "read";
    permission java.util.PropertyPermission "phoenix-group.jar", "read";
    permission java.util.PropertyPermission "phoenix-init.jar", "read";
    permission java.util.PropertyPermission "phoenix.jar", "read";
    permission java.util.PropertyPermission "platform.jar", "read";
    permission java.util.PropertyPermission "policy.writer.jar", "read";
    permission java.util.PropertyPermission "qaClassServer.adminName", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "qaClassServer.dir", "read";
    permission java.util.PropertyPermission "qaClassServer.dir.0", "read";
    permission java.util.PropertyPermission "qaClassServer.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.impl.0", "read";
    permission java.util.PropertyPermission "qaClassServer.port", "read";
    permission java.util.PropertyPermission "qaClassServer.port.0", "read";
    permission java.util.PropertyPermission "qaClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "qaClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "qaClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.type", "read";
    permission java.util.PropertyPermission "qaClassServer.type.0", "read";
    permission java.util.PropertyPermission "qaClassServer.type.1", "read";
    permission java.util.PropertyPermission "reggie-dl.jar", "read";
    permission java.util.PropertyPermission "reggie.jar", "read";
    permission java.util.PropertyPermission "river.version", "read";
    permission java.util.PropertyPermission "start.jar", "read";
    permission java.util.PropertyPermission "testClassServer.adminName", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "testClassServer.dir", "read";
    permission java.util.PropertyPermission "testClassServer.dir.0", "read";
    permission java.util.PropertyPermission "testClassServer.impl", "read";
    permission java.util.PropertyPermission "testClassServer.impl.0", "read";
    permission java.util.PropertyPermission "testClassServer.port", "read";
    permission java.util.PropertyPermission "testClassServer.port.0", "read";
    permission java.util.PropertyPermission "testClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "testClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "testClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "testClassServer.type", "read";
    permission java.util.PropertyPermission "testClassServer.type.0", "read";
    permission java.util.PropertyPermission "testClassServer.type.1", "read";
    permission java.util.PropertyPermission "user.dir", "read";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jiniharness.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission javax.security.auth.AuthPermission "getSubject";
    permission java.lang.RuntimePermission "exitVM.0";
    permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\java", "execute";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\reggie\\reggie.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\starter\\starter.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultnonactvm.policy", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultsecurereggie.policy", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\dynamic-policy.properties", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\phoenix.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\reggie.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\tester.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\truststore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\resources\\jinitest.policy", "read";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
    permission net.jini.security.GrantPermission "net.jini.security.AuthenticationPermission \"javax.security.auth.x500.X500Principal \\\"CN=Tester\\\" peer javax.security.auth.x500.X500Principal \\\"CN=Reggie\\\"\", \"connect\";";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
    permission java.net.SocketPermission "localhost:0", "listen,resolve";
    permission java.net.SocketPermission "localhost:9080", "listen,resolve";
    permission java.net.SocketPermission "localhost:9081", "listen,resolve";
    permission java.net.SocketPermission "localhost:9082", "listen,resolve";
    permission java.util.PropertyPermission "/", "read";
    permission java.util.PropertyPermission "HOST", "read";
    permission java.util.PropertyPermission "activation.jar", "read";
    permission java.util.PropertyPermission "bouncy-jce.jar", "read";
    permission java.util.PropertyPermission "bouncy-jsse.jar", "read";
    permission java.util.PropertyPermission "classserver.jar", "read";
    permission java.util.PropertyPermission "collections.jar", "read";
    permission java.util.PropertyPermission "destroy.jar", "read";
    permission java.util.PropertyPermission "disco.jar", "read";
    permission java.util.PropertyPermission "fiddler-dl.jar", "read";
    permission java.util.PropertyPermission "fiddler.jar", "read";
    permission java.util.PropertyPermission "file.ext", "read";
    permission java.util.PropertyPermission "globalclasspath", "read";
    permission java.util.PropertyPermission "group.jar", "read";
    permission java.util.PropertyPermission "high-scale-lib.jar", "read";
    permission java.util.PropertyPermission "java.class.path", "read";
    permission java.util.PropertyPermission "java.home", "read";
    permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
    permission java.util.PropertyPermission "java.util.logging.config.file", "read";
    permission java.util.PropertyPermission "jeri.jar", "read";
    permission java.util.PropertyPermission "jgdms-rmi-tls.jar", "read";
    permission java.util.PropertyPermission "jiniClassServer.adminName", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.dir", "read";
    permission java.util.PropertyPermission "jiniClassServer.dir.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.impl.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.port", "read";
    permission java.util.PropertyPermission "jiniClassServer.port.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "jiniClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.type", "read";
    permission java.util.PropertyPermission "jiniClassServer.type.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.type.1", "read";
    permission java.util.PropertyPermission "jsk-dl.jar", "read";
    permission java.util.PropertyPermission "jsk-lib.jar", "read";
    permission java.util.PropertyPermission "jsk.iiop.jar", "read";
    permission java.util.PropertyPermission "jsk.jrmp.jar", "read";
    permission java.util.PropertyPermission "jsk.pref.jar", "read";
    permission java.util.PropertyPermission "jsk.url.jar", "read";
    permission java.util.PropertyPermission "loader.jar", "read";
    permission java.util.PropertyPermission "mahalo-dl.jar", "read";
    permission java.util.PropertyPermission "mahalo.jar", "read";
    permission java.util.PropertyPermission "mercury-dl.jar", "read";
    permission java.util.PropertyPermission "mercury.jar", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.adminName", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.impl", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.instances", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.1", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.1", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.1", "read";
    permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.adminName", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.classpath", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.classpath.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.codebase", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.codebase.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.impl.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.integrityhash", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.integrityhash.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.policyfile", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.policyfile.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvm", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvm.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.transient.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type.1", "read";
    permission java.util.PropertyPermission "norm-dl.jar", "read";
    permission java.util.PropertyPermission "norm.jar", "read";
    permission java.util.PropertyPermission "org.apache.river.jsk.home", "read";
    permission java.util.PropertyPermission "org.apache.river.jsk.port", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.callAutoT", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9080", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9081", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.globalvmargs", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.integrityhash", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.nSecsWaitDestroy", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.runjiniserver", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.runkitserver", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.securityproperties", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.serviceMode", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.shared", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.startDelay", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.testClassServer", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.home", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.port", "read";
    permission java.util.PropertyPermission "org.apache.river.test.home", "read";
    permission java.util.PropertyPermission "org.apache.river.test.port", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actClasspath", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actCodebase", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntLeaseExp", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntNotify", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTListener", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTSrvcLeaseExp", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.nInstancesPerClass", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.outputRoot", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.policy", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.rmiCodebase", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.selectMethod", "read";
    permission java.util.PropertyPermission "os.name", "read";
    permission java.util.PropertyPermission "outrigger-dl.jar", "read";
    permission java.util.PropertyPermission "outrigger-snaplogstore.jar", "read";
    permission java.util.PropertyPermission "outrigger.jar", "read";
    permission java.util.PropertyPermission "phoenix-common.jar", "read";
    permission java.util.PropertyPermission "phoenix-dl.jar", "read";
    permission java.util.PropertyPermission "phoenix-group.jar", "read";
    permission java.util.PropertyPermission "phoenix-init.jar", "read";
    permission java.util.PropertyPermission "phoenix.jar", "read";
    permission java.util.PropertyPermission "platform.jar", "read";
    permission java.util.PropertyPermission "policy.writer.jar", "read";
    permission java.util.PropertyPermission "qaClassServer.adminName", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "qaClassServer.dir", "read";
    permission java.util.PropertyPermission "qaClassServer.dir.0", "read";
    permission java.util.PropertyPermission "qaClassServer.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.impl.0", "read";
    permission java.util.PropertyPermission "qaClassServer.port", "read";
    permission java.util.PropertyPermission "qaClassServer.port.0", "read";
    permission java.util.PropertyPermission "qaClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "qaClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "qaClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.type", "read";
    permission java.util.PropertyPermission "qaClassServer.type.0", "read";
    permission java.util.PropertyPermission "qaClassServer.type.1", "read";
    permission java.util.PropertyPermission "reggie-dl.jar", "read";
    permission java.util.PropertyPermission "reggie.jar", "read";
    permission java.util.PropertyPermission "river.version", "read";
    permission java.util.PropertyPermission "start.jar", "read";
    permission java.util.PropertyPermission "testClassServer.adminName", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "testClassServer.dir", "read";
    permission java.util.PropertyPermission "testClassServer.dir.0", "read";
    permission java.util.PropertyPermission "testClassServer.impl", "read";
    permission java.util.PropertyPermission "testClassServer.impl.0", "read";
    permission java.util.PropertyPermission "testClassServer.port", "read";
    permission java.util.PropertyPermission "testClassServer.port.0", "read";
    permission java.util.PropertyPermission "testClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "testClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "testClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "testClassServer.type", "read";
    permission java.util.PropertyPermission "testClassServer.type.0", "read";
    permission java.util.PropertyPermission "testClassServer.type.1", "read";
    permission java.util.PropertyPermission "user.dir", "read";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jiniharness.jar"
{
    permission javax.security.auth.AuthPermission "createLoginContext.org.apache.river.Test";
    permission javax.security.auth.AuthPermission "doAsPrivileged";
    permission java.lang.RuntimePermission "getenv.SOUL";
    permission java.lang.RuntimePermission "setIO";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\test.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\soul\\soul.202105041751026391", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\test_set02\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
    permission java.io.FilePermission "org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
    permission java.security.SecurityPermission "createPolicy.JiniPolicy";
    permission java.security.SecurityPermission "getPolicy";
    permission java.security.SecurityPermission "setPolicy";
    permission java.util.PropertyPermission "line.separator", "read";
    permission java.util.PropertyPermission "loader.requireDlPerm", "read";
    permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.defaultTestConfig", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
    permission java.util.PropertyPermission "testConfiguration", "read";
    permission java.util.PropertyPermission "testFailureAnalyzers", "read";
    permission java.util.PropertyPermission "user.dir", "read";
    permission java.util.logging.LoggingPermission "control";
};

grant codebase "jrt:/java.smartcardio"
{
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
    permission java.security.SecurityPermission "putProviderProperty.SunPCSC";
};

grant codebase "httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77"
{
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-pref-class-loader-3.1.1-SNAPSHOT.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission javax.security.auth.AuthPermission "getSubject";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
};

grant codebase "httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission javax.security.auth.AuthPermission "getSubject";
    permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
    permission java.util.PropertyPermission "org.apache.river.reggie.enableImplToStubReplacement", "read";
};

grant codebase "jrt:/jdk.crypto.mscapi"
{
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
    permission java.lang.RuntimePermission "loadLibrary.sunmscapi";
    permission java.security.SecurityPermission "putProviderProperty.SunMSCAPI";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib-dl/jgdms-lib-dl-3.1.1-SNAPSHOT.jar"
{
    permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-url-integrity-3.1.1-SNAPSHOT.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission java.net.NetPermission "specifyStreamHandler";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-pref-class-loader-3.1.1-SNAPSHOT.jar"
{
    permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "GET:";
    permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar", "GET:";
    permission java.lang.RuntimePermission "accessClassInPackage.jdk.internal.reflect";
    permission java.lang.RuntimePermission "createClassLoader";
    permission java.lang.RuntimePermission "getClassLoader";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2", "connect,accept,resolve";
    permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
    permission java.util.PropertyPermission "net.jini.loader.codebaseAnnotation", "read";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-collections-3.1.1-SNAPSHOT.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
};

grant codebase "jrt:/java.security.jgss"
{
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
    permission java.security.SecurityPermission "putProviderProperty.SunJGSS";
};

grant codebase "httpmd://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar;md5=c1233e711b1fc12d6df366839f425ebd"
{
    permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-platform-3.1.1-SNAPSHOT.jar"
{
    permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
    permission org.apache.river.thread.ThreadPoolPermission "getUserThreadPool";
    permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "GET:";
    permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar", "GET:";
    permission java.io.SerializablePermission "enableSubclassImplementation";
    permission java.io.SerializablePermission "enableSubstitution";
    permission org.apache.river.jeri.internal.EndpointInternalsPermission "set";
    permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
    permission javax.security.auth.AuthPermission "createLoginContext.org.apache.river.Test";
    permission javax.security.auth.AuthPermission "doAsPrivileged";
    permission javax.security.auth.AuthPermission "getLoginConfiguration";
    permission javax.security.auth.AuthPermission "getSubject";
    permission javax.security.auth.AuthPermission "getSubjectFromDomainCombiner";
    permission javax.security.auth.AuthPermission "modifyPrincipals";
    permission javax.security.auth.AuthPermission "modifyPrivateCredentials";
    permission javax.security.auth.AuthPermission "modifyPublicCredentials";
    permission javax.security.auth.AuthPermission "setLoginConfiguration";
    permission java.lang.RuntimePermission "accessClassInPackage.jdk.internal.reflect";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.jca";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.krb5";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.pkcs";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.provider";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math.intpoly";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.x509";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.util.locale.provider";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.util.resources";
    permission java.lang.RuntimePermission "accessDeclaredMembers";
    permission java.lang.RuntimePermission "accessSystemModules";
    permission java.lang.RuntimePermission "createClassLoader";
    permission java.lang.RuntimePermission "createSecurityManager";
    permission java.lang.RuntimePermission "getClassLoader";
    permission java.lang.RuntimePermission "getProtectionDomain";
    permission java.lang.RuntimePermission "getStackWalkerWithClassReference";
    permission java.lang.RuntimePermission "getenv.SOUL";
    permission java.lang.RuntimePermission "loadLibrary.net";
    permission java.lang.RuntimePermission "loadLibrary.nio";
    permission java.lang.RuntimePermission "loadLibrary.sunec";
    permission java.lang.RuntimePermission "loadLibrary.sunmscapi";
    permission java.lang.RuntimePermission "loadLibrary.zip";
    permission java.lang.RuntimePermission "localeServiceProvider";
    permission java.lang.RuntimePermission "loggerFinder";
    permission java.lang.RuntimePermission "modifyThread";
    permission java.lang.RuntimePermission "modifyThreadGroup";
    permission java.lang.RuntimePermission "readFileDescriptor";
    permission java.lang.RuntimePermission "reflectionFactoryAccess";
    permission java.lang.RuntimePermission "setContextClassLoader";
    permission java.lang.RuntimePermission "setIO";
    permission java.lang.RuntimePermission "shutdownHooks";
    permission java.lang.RuntimePermission "writeFileDescriptor";
    permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
    permission net.jini.io.context.ContextPermission "net.jini.io.context.ClientSubject.getClientSubject";
    permission javax.security.auth.PrivateCredentialPermission "javax.security.auth.x500.X500PrivateCredential javax.security.auth.x500.X500Principal \"CN=Tester\"", "read";
    permission java.net.NetPermission "getCookieHandler";
    permission java.net.NetPermission "getNetworkInformation";
    permission java.net.NetPermission "getProxySelector";
    permission java.net.NetPermission "getResponseCache";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\net.dll", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\nio.dll", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\sunec.dll", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\sunmscapi.dll", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\zip.dll", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\net.properties", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\security\\policy\\unlimited", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\security\\policy\\unlimited\\default_US_export.policy", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\conf\\security\\policy\\unlimited\\default_local.policy", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\lib\\security\\blacklisted.certs", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\lib\\security\\cacerts", "read";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\lib\\tzdb.dat", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache13530489763375062441.tmp", "delete";
    permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache13530489763375062441.tmp", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache13530489763375062441.tmp", "write";
    permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache6285608515666175907.tmp", "delete";
    permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache6285608515666175907.tmp", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\AppData\\Local\\Temp\\jar_cache6285608515666175907.tmp", "write";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib\\jgdms-pref-class-loader-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib\\jgdms-url-integrity-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\test.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\jiniharness.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\jinitests.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\soul\\soul.202105041751026391", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\spec\\lookupservice\\test_set02\\org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
    permission java.io.FilePermission "org\\apache\\river\\test\\spec\\lookupservice\\configs\\jsse\\default.config", "read";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
    permission java.security.SecurityPermission "createAccessControlContext";
    permission java.security.SecurityPermission "createPolicy.JiniPolicy";
    permission java.security.SecurityPermission "getDomainCombiner";
    permission java.security.SecurityPermission "getPolicy";
    permission java.security.SecurityPermission "getProperty.auth.login.defaultCallbackHandler";
    permission java.security.SecurityPermission "getProperty.crypto.policy";
    permission java.security.SecurityPermission "getProperty.jdk.certpath.disabledAlgorithms";
    permission java.security.SecurityPermission "getProperty.jdk.security.caDistrustPolicies";
    permission java.security.SecurityPermission "getProperty.jdk.security.provider.preferred";
    permission java.security.SecurityPermission "getProperty.jdk.serialFilter";
    permission java.security.SecurityPermission "getProperty.jdk.tls.disabledAlgorithms";
    permission java.security.SecurityPermission "getProperty.jdk.tls.keyLimits";
    permission java.security.SecurityPermission "getProperty.jdk.tls.legacyAlgorithms";
    permission java.security.SecurityPermission "getProperty.jdk.tls.server.defaultDHEParameters";
    permission java.security.SecurityPermission "getProperty.keystore.type";
    permission java.security.SecurityPermission "getProperty.keystore.type.compat";
    permission java.security.SecurityPermission "getProperty.login.config.url.1";
    permission java.security.SecurityPermission "getProperty.login.configuration.provider";
    permission java.security.SecurityPermission "getProperty.policy.allowSystemProperty";
    permission java.security.SecurityPermission "getProperty.policy.expandProperties";
    permission java.security.SecurityPermission "getProperty.securerandom.drbg.config";
    permission java.security.SecurityPermission "getProperty.securerandom.source";
    permission java.security.SecurityPermission "getProperty.security.provider.1";
    permission java.security.SecurityPermission "getProperty.security.provider.10";
    permission java.security.SecurityPermission "getProperty.security.provider.11";
    permission java.security.SecurityPermission "getProperty.security.provider.12";
    permission java.security.SecurityPermission "getProperty.security.provider.13";
    permission java.security.SecurityPermission "getProperty.security.provider.14";
    permission java.security.SecurityPermission "getProperty.security.provider.2";
    permission java.security.SecurityPermission "getProperty.security.provider.3";
    permission java.security.SecurityPermission "getProperty.security.provider.4";
    permission java.security.SecurityPermission "getProperty.security.provider.5";
    permission java.security.SecurityPermission "getProperty.security.provider.6";
    permission java.security.SecurityPermission "getProperty.security.provider.7";
    permission java.security.SecurityPermission "getProperty.security.provider.8";
    permission java.security.SecurityPermission "getProperty.security.provider.9";
    permission java.security.SecurityPermission "getProperty.ssl.TrustManagerFactory.algorithm";
    permission java.security.SecurityPermission "putProviderProperty.JdkLDAP";
    permission java.security.SecurityPermission "putProviderProperty.JdkSASL";
    permission java.security.SecurityPermission "putProviderProperty.SUN";
    permission java.security.SecurityPermission "putProviderProperty.SunEC";
    permission java.security.SecurityPermission "putProviderProperty.SunJCE";
    permission java.security.SecurityPermission "putProviderProperty.SunJGSS";
    permission java.security.SecurityPermission "putProviderProperty.SunJSSE";
    permission java.security.SecurityPermission "putProviderProperty.SunMSCAPI";
    permission java.security.SecurityPermission "putProviderProperty.SunPCSC";
    permission java.security.SecurityPermission "putProviderProperty.SunRsaSign";
    permission java.security.SecurityPermission "putProviderProperty.SunSASL";
    permission java.security.SecurityPermission "putProviderProperty.XMLDSig";
    permission java.security.SecurityPermission "setPolicy";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2", "connect,accept,resolve";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2.lan", "resolve";
    permission java.util.PropertyPermission "*", "read,write";
    permission java.util.logging.LoggingPermission "control";
};

grant codebase "jrt:/jdk.security.jgss"
{
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
    permission java.security.SecurityPermission "putProviderProperty.JdkSASL";
};

grant codebase "httpmd://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar;md5=a28068d398d636dd8fbeace7df8faa77"
{
    permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
};

grant codebase "jrt:/jdk.crypto.ec"
{
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.jca";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.pkcs";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util.math.intpoly";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.x509";
    permission java.lang.RuntimePermission "loadLibrary.sunec";
    permission java.security.SecurityPermission "putProviderProperty.SunEC";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-jeri-3.1.1-SNAPSHOT.jar"
{
    permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
    permission org.apache.river.thread.ThreadPoolPermission "getUserThreadPool";
    permission java.io.SerializablePermission "enableSubclassImplementation";
    permission java.io.SerializablePermission "enableSubstitution";
    permission org.apache.river.jeri.internal.EndpointInternalsPermission "set";
    permission java.lang.reflect.ReflectPermission "suppressAccessChecks";
    permission javax.security.auth.AuthPermission "getSubject";
    permission java.lang.RuntimePermission "getClassLoader";
    permission java.lang.RuntimePermission "modifyThread";
    permission java.lang.RuntimePermission "modifyThreadGroup";
    permission java.lang.RuntimePermission "setContextClassLoader";
    permission org.apache.river.api.io.DeSerializationPermission "ATOMIC";
    permission net.jini.io.context.ContextPermission "net.jini.io.context.ClientSubject.getClientSubject";
    permission javax.security.auth.PrivateCredentialPermission "javax.security.auth.x500.X500PrivateCredential javax.security.auth.x500.X500Principal \"CN=Tester\"", "read";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2.lan", "resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
    permission java.util.PropertyPermission "org.apache.river.jeri.connection.mux.client.initialInboundRation", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.connection.mux.server.initialInboundRation", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.connectionTimeout", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.dgc.checkInterval", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.dgc.cleanInterval", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.dgc.leaseValue", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.dgc.minimumDuration", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.handshakeTimeout", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.server.suppressStackTraces", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.certificateType", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.cipherSuites", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.jceProvider", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.jsseProvider", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.secureRandomAlgorithm", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.sslProtocol", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.tcp.useNIO", "read";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-url-integrity-3.1.1-SNAPSHOT.jar"
{
    permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "GET:";
    permission java.net.URLPermission "http://DESKTOP-R0ORPA2:9080/reggie-dl-3.1.1-SNAPSHOT.jar", "GET:";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-jeri-3.1.1-SNAPSHOT.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
    permission javax.security.auth.AuthPermission "getSubject";
    permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
    permission java.io.FilePermission "harness\\trust\\truststore", "read";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "accept";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "accept";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
    permission java.net.SocketPermission "localhost:0", "listen,resolve";
    permission java.util.PropertyPermission "javax.net.ssl.trustStore", "read";
    permission java.util.PropertyPermission "javax.net.ssl.trustStorePassword", "read";
    permission java.util.PropertyPermission "javax.net.ssl.trustStoreType", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxClientSessionDuration", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxServerSessionDuration", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.trustManagerFactoryAlgorithm", "read";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/qa/lib/jinitests.jar"
{
    permission java.lang.RuntimePermission "createClassLoader";
    permission java.util.PropertyPermission "loader.requireDlPerm", "read";
    permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
};

grant codebase "jrt:/jdk.security.auth"
{
    permission javax.security.auth.AuthPermission "modifyPrincipals";
    permission javax.security.auth.AuthPermission "modifyPrivateCredentials";
    permission javax.security.auth.AuthPermission "modifyPublicCredentials";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.krb5";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
    permission java.lang.RuntimePermission "getProtectionDomain";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\jiniharness.jar", "read";
};

grant codebase "jrt:/jdk.crypto.cryptoki"
{
    permission java.lang.RuntimePermission "accessClassInPackage.sun.security.util";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/classserver-3.1.1-SNAPSHOT.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
    permission java.net.SocketPermission "localhost:9080", "listen,resolve";
    permission java.net.SocketPermission "localhost:9081", "listen,resolve";
    permission java.net.SocketPermission "localhost:9082", "listen,resolve";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-collections-3.1.1-SNAPSHOT.jar"
{
    permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
    permission org.apache.river.thread.ThreadPoolPermission "getUserThreadPool";
    permission java.lang.RuntimePermission "getClassLoader";
    permission java.lang.RuntimePermission "modifyThread";
    permission java.lang.RuntimePermission "modifyThreadGroup";
    permission java.lang.RuntimePermission "setContextClassLoader";
    permission java.lang.RuntimePermission "shutdownHooks";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2.lan", "resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
};

grant codebase "jrt:/jdk.localedata"
{
    permission java.lang.RuntimePermission "accessClassInPackage.sun.util.locale.provider";
    permission java.lang.RuntimePermission "accessClassInPackage.sun.util.resources";
};

grant codebase "file:/C:/Users/peter/Documents/NetBeansProjects/JGDMS/JGDMS/dist/target/JGDMS-3.1.1-SNAPSHOT/lib/jgdms-platform-3.1.1-SNAPSHOT.jar",
    principal javax.security.auth.x500.X500Principal "CN=Tester"
{
    permission org.apache.river.thread.ThreadPoolPermission "getSystemThreadPool";
    permission javax.security.auth.AuthPermission "getSubject";
    permission java.lang.RuntimePermission "exitVM.0";
    permission org.apache.river.api.io.DeSerializationPermission "MARSHALL";
    permission java.net.NetPermission "specifyStreamHandler";
    permission java.io.FilePermission "C:\\Program Files\\Zulu\\zulu-13\\bin\\java", "execute";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\jgdms-lib-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\JGDMS\\dist\\target\\JGDMS-3.1.1-SNAPSHOT\\lib-dl\\reggie-dl-3.1.1-SNAPSHOT.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\reggie\\reggie.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\configs\\jsse\\starter\\starter.config", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultnonactvm.policy", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\policy\\defaultsecurereggie.policy", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\dynamic-policy.properties", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\jsselogins", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\phoenix.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\reggie.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\tester.keystore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\harness\\trust\\truststore", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\nonactivatablegroup-dl.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\lib\\qa1-lookupservice-dl.jar", "read";
    permission java.io.FilePermission "C:\\Users\\peter\\Documents\\NetBeansProjects\\JGDMS\\qa\\src\\org\\apache\\river\\test\\resources\\jinitest.policy", "read";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\"", "listen";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Phoenix\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "accept";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Reggie\"", "connect";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "accept";
    permission net.jini.security.AuthenticationPermission "javax.security.auth.x500.X500Principal \"CN=Tester\" peer javax.security.auth.x500.X500Principal \"CN=Tester\"", "connect";
    permission net.jini.security.GrantPermission "net.jini.security.AuthenticationPermission \"javax.security.auth.x500.X500Principal \\\"CN=Tester\\\" peer javax.security.auth.x500.X500Principal \\\"CN=Reggie\\\"\", \"connect\";";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2", "resolve";
    permission java.net.SocketPermission "DESKTOP-R0ORPA2:9080", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4506", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4509", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4510", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4526", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4529", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4530", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4531", "connect,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4532", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4533", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4555", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4580", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4596", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4604", "accept,resolve";
    permission java.net.SocketPermission "[fe80:0:0:0:9ca0:dfeb:b9a7:96fd%16]:4605", "accept,resolve";
    permission java.net.SocketPermission "localhost:0", "listen,resolve";
    permission java.net.SocketPermission "localhost:9080", "listen,resolve";
    permission java.net.SocketPermission "localhost:9081", "listen,resolve";
    permission java.net.SocketPermission "localhost:9082", "listen,resolve";
    permission java.util.PropertyPermission "/", "read";
    permission java.util.PropertyPermission "HOST", "read";
    permission java.util.PropertyPermission "activation.jar", "read";
    permission java.util.PropertyPermission "bouncy-jce.jar", "read";
    permission java.util.PropertyPermission "bouncy-jsse.jar", "read";
    permission java.util.PropertyPermission "classserver.jar", "read";
    permission java.util.PropertyPermission "collections.jar", "read";
    permission java.util.PropertyPermission "destroy.jar", "read";
    permission java.util.PropertyPermission "disco.jar", "read";
    permission java.util.PropertyPermission "fiddler-dl.jar", "read";
    permission java.util.PropertyPermission "fiddler.jar", "read";
    permission java.util.PropertyPermission "file.ext", "read";
    permission java.util.PropertyPermission "globalclasspath", "read";
    permission java.util.PropertyPermission "group.jar", "read";
    permission java.util.PropertyPermission "high-scale-lib.jar", "read";
    permission java.util.PropertyPermission "java.class.path", "read";
    permission java.util.PropertyPermission "java.home", "read";
    permission java.util.PropertyPermission "java.rmi.server.codebase", "read";
    permission java.util.PropertyPermission "java.util.logging.config.file", "read";
    permission java.util.PropertyPermission "javax.net.ssl.trustStore", "read";
    permission java.util.PropertyPermission "javax.net.ssl.trustStorePassword", "read";
    permission java.util.PropertyPermission "javax.net.ssl.trustStoreType", "read";
    permission java.util.PropertyPermission "jeri.jar", "read";
    permission java.util.PropertyPermission "jgdms-rmi-tls.jar", "read";
    permission java.util.PropertyPermission "jiniClassServer.adminName", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "jiniClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.dir", "read";
    permission java.util.PropertyPermission "jiniClassServer.dir.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.impl.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.port", "read";
    permission java.util.PropertyPermission "jiniClassServer.port.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "jiniClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "jiniClassServer.type", "read";
    permission java.util.PropertyPermission "jiniClassServer.type.0", "read";
    permission java.util.PropertyPermission "jiniClassServer.type.1", "read";
    permission java.util.PropertyPermission "jsk-dl.jar", "read";
    permission java.util.PropertyPermission "jsk-lib.jar", "read";
    permission java.util.PropertyPermission "jsk.iiop.jar", "read";
    permission java.util.PropertyPermission "jsk.jrmp.jar", "read";
    permission java.util.PropertyPermission "jsk.pref.jar", "read";
    permission java.util.PropertyPermission "jsk.url.jar", "read";
    permission java.util.PropertyPermission "loader.jar", "read";
    permission java.util.PropertyPermission "mahalo-dl.jar", "read";
    permission java.util.PropertyPermission "mahalo.jar", "read";
    permission java.util.PropertyPermission "mercury-dl.jar", "read";
    permission java.util.PropertyPermission "mercury.jar", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.adminName", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.classpath.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.codebase.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.component.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.impl", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.instances", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.integrityhash.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.membergroups.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.policyfile.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.port.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.preparername.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.running.1", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.serviceConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.starterConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.tojoin.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.classpath.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.codebase.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.component.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.impl.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.integrityhash.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.log.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.membergroups.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.policyfile.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.port.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.preparername.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.running.1", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.serviceConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.starterConfiguration.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.transient.tojoin.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.0", "read";
    permission java.util.PropertyPermission "net.jini.core.lookup.ServiceRegistrar.type.1", "read";
    permission java.util.PropertyPermission "net.jini.discovery.announce", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.adminName", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.classpath", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.classpath.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.codebase", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.codebase.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.impl.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.integrityhash", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.integrityhash.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.classpath.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.codebase.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.impl.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.integrityhash.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.policyfile.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvm.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.nonactivatablegroup.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.policyfile", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.policyfile.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvm", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvm.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.transient.impl", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type.0", "read";
    permission java.util.PropertyPermission "nonActivatableGroup.type.1", "read";
    permission java.util.PropertyPermission "norm-dl.jar", "read";
    permission java.util.PropertyPermission "norm.jar", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxClientSessionDuration", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.maxServerSessionDuration", "read";
    permission java.util.PropertyPermission "org.apache.river.jeri.ssl.trustManagerFactoryAlgorithm", "read";
    permission java.util.PropertyPermission "org.apache.river.jsk.home", "read";
    permission java.util.PropertyPermission "org.apache.river.jsk.port", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.callAutoT", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9080", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.dldir.9081", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.globalvmargs", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.integrityhash", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.nSecsWaitDestroy", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.runjiniserver", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.runkitserver", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.securityproperties", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.serviceMode", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.shared", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.startDelay", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.testClassServer", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.harness.testhosts", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.home", "read";
    permission java.util.PropertyPermission "org.apache.river.qa.port", "read";
    permission java.util.PropertyPermission "org.apache.river.reggie.enableImplToStubReplacement", "read";
    permission java.util.PropertyPermission "org.apache.river.test.home", "read";
    permission java.util.PropertyPermission "org.apache.river.test.port", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actClasspath", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.actCodebase", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntLeaseExp", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTEvntNotify", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTListener", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.deltaTSrvcLeaseExp", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.nInstancesPerClass", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.outputRoot", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.policy", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.rmiCodebase", "read";
    permission java.util.PropertyPermission "org.apache.river.test.spec.lookupservice.selectMethod", "read";
    permission java.util.PropertyPermission "os.name", "read";
    permission java.util.PropertyPermission "outrigger-dl.jar", "read";
    permission java.util.PropertyPermission "outrigger-snaplogstore.jar", "read";
    permission java.util.PropertyPermission "outrigger.jar", "read";
    permission java.util.PropertyPermission "phoenix-common.jar", "read";
    permission java.util.PropertyPermission "phoenix-dl.jar", "read";
    permission java.util.PropertyPermission "phoenix-group.jar", "read";
    permission java.util.PropertyPermission "phoenix-init.jar", "read";
    permission java.util.PropertyPermission "phoenix.jar", "read";
    permission java.util.PropertyPermission "platform.jar", "read";
    permission java.util.PropertyPermission "policy.writer.jar", "read";
    permission java.util.PropertyPermission "qaClassServer.adminName", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "qaClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "qaClassServer.dir", "read";
    permission java.util.PropertyPermission "qaClassServer.dir.0", "read";
    permission java.util.PropertyPermission "qaClassServer.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.impl.0", "read";
    permission java.util.PropertyPermission "qaClassServer.port", "read";
    permission java.util.PropertyPermission "qaClassServer.port.0", "read";
    permission java.util.PropertyPermission "qaClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "qaClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "qaClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "qaClassServer.type", "read";
    permission java.util.PropertyPermission "qaClassServer.type.0", "read";
    permission java.util.PropertyPermission "qaClassServer.type.1", "read";
    permission java.util.PropertyPermission "reggie-dl.jar", "read";
    permission java.util.PropertyPermission "reggie.jar", "read";
    permission java.util.PropertyPermission "river.version", "read";
    permission java.util.PropertyPermission "start.jar", "read";
    permission java.util.PropertyPermission "testClassServer.adminName", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.dir", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.dir.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.impl", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.impl.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.port", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.port.0", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "testClassServer.classServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "testClassServer.dir", "read";
    permission java.util.PropertyPermission "testClassServer.dir.0", "read";
    permission java.util.PropertyPermission "testClassServer.impl", "read";
    permission java.util.PropertyPermission "testClassServer.impl.0", "read";
    permission java.util.PropertyPermission "testClassServer.port", "read";
    permission java.util.PropertyPermission "testClassServer.port.0", "read";
    permission java.util.PropertyPermission "testClassServer.serverjvmargs", "read";
    permission java.util.PropertyPermission "testClassServer.serverjvmargs.0", "read";
    permission java.util.PropertyPermission "testClassServer.transient.impl", "read";
    permission java.util.PropertyPermission "testClassServer.type", "read";
    permission java.util.PropertyPermission "testClassServer.type.0", "read";
    permission java.util.PropertyPermission "testClassServer.type.1", "read";
    permission java.util.PropertyPermission "user.dir", "read";
};

grant codebase "jrt:/java.xml.crypto"
{
    permission java.security.SecurityPermission "putProviderProperty.XMLDSig";
    permission java.util.PropertyPermission "java.specification.version", "read";
};



More information about the security-dev mailing list