[EXTERNAL] Re: An update on ecosystem concerns removing javax.security.cert
John Gray
John.Gray at entrust.com
Mon Apr 17 14:04:30 UTC 2023
I just happened to notice this on the list this morning. We have a 20+ year old commercial Java cryptographic toolkit at Entrust that we maintain and implement security protocols and algorithms which makes use of API’s in the javax.security.cert package. It is in used by many customers. It looks like you are planning to remove that entire package now? We still compile with Java 8 (because we have customers that still need Java 8 support), but we need to support later Java runtime versions. I guess we would have eventually noticed this when we upped our base compiler to 11 which probably won’t happen until 8 no longer has extended support (which is 2030 according to this?) https://www.oracle.com/java/technologies/java-se-support-roadmap.html). Though.. I would hope everyone would be off 8 in the next few years… 😊
I guess we will have to make a number of changes to our toolkit because this change will break things in a number of areas in Java 19. I guess we have until the next LTS to do all this work… ☹
John Gray
Entrust
From: security-dev <security-dev-retn at openjdk.org> On Behalf Of Eirik Bjørsnøs
Sent: Monday, April 17, 2023 4:00 AM
To: security-dev at openjdk.org
Subject: [EXTERNAL] Re: An update on ecosystem concerns removing javax.security.cert
WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
________________________________
I reached out to the BouncyCastle project [3] and they are basically OK with the OpenJDK project to go ahead and remove the APIs:
I reached out to the Conscrypt team with a PR. While the PR cannot be integrated in its current form, the ensuing discussion was instructive:
https://github.com/google/conscrypt/pull/1128<https://urldefense.com/v3/__https:/github.com/google/conscrypt/pull/1128__;!!FJ-Y8qCqXTj2!ar5kpb1r1i5Xsn4u_CR5zwdcmGLyTQNySwfvEMWPMEjNW17SrO-GOrkWEQGnrbFi3MfR3pKBr-yZvfDVFa_8$>
Pete provides a neat explanation of how Conscrypt is packaged and used in the wider Opecosystem. I think the key takeaway for OpenJDK seems to be:
I think for OpenJDK and standalone Android builds, it's probably fine to simply drop support for the getPeerCertificateChain() API at a release boundary. Caveat emptor etc.
TBH we've never assumed that upstream OpenJDK would worry about us when making breaking changes. :) I don't mean that in a negative way, just that your priorities are not the same as ours and so it's up to us to react as needed.
Pete then goes on to explain that javax.security.cert currently isn't formally marked as deprecated in Android Platform, so they are lagging behind aim to align with OpenJDK in this respect.
The rest of his comments are mainly focused on the Android parts, it's a good read for anyone interested in that.
Thanks,
Eirik.
Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.openjdk.org/pipermail/security-dev/attachments/20230417/3babd9f0/attachment.htm>
More information about the security-dev
mailing list