RFR: 8255552: Add DES/3DES/MD5 to jdk.security.legacyAlgorithms [v2]

Hai-May Chao hchao at openjdk.java.net
Thu Apr 28 06:46:36 UTC 2022


On Wed, 27 Apr 2022 19:34:04 GMT, Sean Mullan <mullan at openjdk.org> wrote:

>> Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision:
>> 
>>   SecretKeyConstraintsParameters subclass created and property description updated
>
> src/java.base/share/classes/sun/security/tools/keytool/Main.java line 1876:
> 
>> 1874: 
>> 1875:         CertPathConstraintsParameters cpcp =
>> 1876:                 new CertPathConstraintsParameters(secKey, null, null, null);
> 
> Using `CertPathConstraintsParameters` is a little odd here, even though it works. I suggest creating a local `SecretKeyConstraintsParameters` subclass with a ctor with just the parameters you need and overriding the methods as needed. And changing `checkWeakConstraint` to take a `ConstraintsParameters` instead of `CertPathConstraintsParameters`.

Created `SecretKeyConstraintsParameter` subclass for keytool.

> src/java.base/share/conf/security/java.security line 657:
> 
>> 655: # implementations.
>> 656: 
>> 657: jdk.security.legacyAlgorithms=SHA1, \
> 
> Since we are now warning about weak symmetric key algorithms, we should make the description of this property more general. I would change lines 641-2 to "Legacy cryptographic algorithms and key lengths".

Updated the description.

> test/jdk/sun/security/tools/keytool/ReadJar.java line 162:
> 
>> 160:                 .shouldContain("Certificate #2:")
>> 161:                 .shouldContain("Signer #2:")
>> 162:                 .shouldNotMatch("The certificate #.* of signer #.*" + "uses the SHA1withRSA.*will be disabled")
> 
> You probably don't need to check for a non-occurrence here since the message has been changed and can no longer occur.

Removed the checking for a non-occurrence from the tests.

-------------

PR: https://git.openjdk.java.net/jdk/pull/8300



More information about the security-dev mailing list