PrivilegedAction et al and JEP411

Ron Pressler ron.pressler at oracle.com
Mon Jun 19 15:11:10 UTC 2023



> On 19 Jun 2023, at 12:48, Peter Firmstone <peter.firmstone at zeus.net.au> wrote:
> 
> For most Java developers, and Jvm users, it means that all Java bytecodes need to be audited and trusted, 

That has always been the case for *server* applications because SecurityManager has never protected against some of the most common attacks against servers. Secure servers employ OS-level defences, and that’s the approach the vast majority of secure Java servers — and secure servers in any other language — already take.

However, note that with "integrity by default" (https://openjdk.org/jeps/8305968) Java is now making it easier than ever before to establish invariants locally and trust them globally regardless of what any other code does. This is precisely to allow more robust reasoning about important program properties, whether they’re used for correctness, security, or performance. It also establishes a more robust and convenient separation of responsibilities among the different layers — hardware, OS, JVM — over which invariants they each maintain.

— Ron


More information about the security-dev mailing list