RFR: 8255552: Add DES/3DES/MD5 to jdk.security.legacyAlgorithms [v2]

Sean Mullan mullan at openjdk.java.net
Thu Apr 28 13:51:45 UTC 2022


On Wed, 27 Apr 2022 19:35:04 GMT, Sean Mullan <mullan at openjdk.org> wrote:

>> Hai-May Chao has updated the pull request incrementally with one additional commit since the last revision:
>> 
>>   SecretKeyConstraintsParameters subclass created and property description updated
>
> Changes requested by mullan (Reviewer).

> @seanjmullan Since we use symmetric keys to encrypt entries and add integrity check, should this enhancement cover them as well? For example, if a PKCS12 keystore is created with `-J-Dkeystore.pkcs12.legacy=true`, should the algorithms used be warned? BTW, in legacy mode, we use PBEWithSHA1AndRC2_40 when encrypting keys. Should the security property include "RC2" as well?
> 
> Not sure if it's doable, because those are PKCS12-specific codes. `keytool` is not able to see them.

Right, I think this would require knowledge of what keystore type is being used and parsing the PKCS12 encoded bytes which seems beyond the scope of this RFE. Also, those algorithms are disabled by default, so in some sense the user is making a decision to use them by enabling the system property and therefore are taking the risk themselves.

-------------

PR: https://git.openjdk.java.net/jdk/pull/8300



More information about the security-dev mailing list