PrivilegedAction et al and JEP411

Peter Firmstone peter.firmstone at zeus.net.au
Tue Jun 20 05:26:45 UTC 2023


Don't get me wrong, it's good that OpenJDK is improving encapsulation, 
it's just OpenJDK is also undoing years of tested and hardened API's, 
that we're expected to come up with DIY solutions for, with zero care 
from OpenJDK and some very bad examples of alternative solutions, not to 
mention a completely wrong assessment of SM based on an outdated poorly 
maintained implementation, with lack of use and maintenance burden (when 
the community is willing but not allowed to maintain it) as 
justification for it's removal.

SecurityManager is just an authorization layer (that allows assigning 
different levels of trust), not a magic wand designed to solve all 
security problems (or sandbox, it was only a component in the sandbox, 
along with bytecode verification and ClassLoader visibility), to be 
discarded because it doesn't solve some other unrelated security flaw, 
it's an Non Functional Requirement, it doesn't bring in any revenue for 
Oracle, nor does it for many other development projects, so management 
have knocked it on the head, we get it.   SM's only benefit is a little 
more sleep at night as a mitigating factor in avoiding becoming 
tomorrow's news headline.   It might not be perfect, it could be better, 
it's just the best authentication layer currently available, which makes 
Java an enterprise ready solution.  So now Java is only marketed for 
server code, where all code must be trusted and audited prior to 
deployment, it has me wondering if OpenJDK will be removing dynamic 
ClassLoading in future, we don't need that for static code do we?  Don't 
answer that, I'm being sarcastic.

We know that Oracle intends to remove authorization from the Java 
platform, we also know that there is nothing we can say to convince 
Oracle it's a bad idea, the only thing management will understand is bad 
consequences, such as bad news headlines.   I understand that Oracle 
needs to monetize Java, they've done a great job reviving Java from 
where Sun was failing and it's given us many more years of Java.

Elasticsearch is a good example of SecurityManager applied properly, 
there are many other things that Elasticsearch does, in combination with 
SecurityManager to secure their platform, SecurityManager is only a part 
of their security strategy. Security is like a chain, remove a link and 
the chain is broken, no one's offering to repair the chain, OpenJDK is 
only attempting to reassure us we don't need that link, but experience 
tells us the chain is broken.    We've been working hard at implementing 
authorization for many years, to protect against attacks, but suddenly 
the threat is gone?   Yeah right, there's a bridge in Brooklyn for sale.

https://spinscale.de/posts/2020-04-07-elasticsearch-securing-a-search-engine-while-maintaining-usability.html

The decision has been made, it's final, the debate is over, we're just 
waiting for the removal notice now.   How about someone raise a JEP to 
remove security manager, targeting a particular release version 
(preferably 22, but so be it if it's 21) so we can remove uncertainty 
and notify our users of the versions of Java we'll be supporting going 
forward?   Then it's over and we can stop worrying about it.

There's a cloud outside and I've got some yelling to do.

-- 
Regards,
  
Peter

On 20/06/2023 1:11 am, Ron Pressler wrote:
>
>> On 19 Jun 2023, at 12:48, Peter Firmstone <peter.firmstone at zeus.net.au> wrote:
>>
>> For most Java developers, and Jvm users, it means that all Java bytecodes need to be audited and trusted,
> That has always been the case for *server* applications because SecurityManager has never protected against some of the most common attacks against servers. Secure servers employ OS-level defences, and that’s the approach the vast majority of secure Java servers — and secure servers in any other language — already take.
>
> However, note that with "integrity by default" (https://openjdk.org/jeps/8305968) Java is now making it easier than ever before to establish invariants locally and trust them globally regardless of what any other code does. This is precisely to allow more robust reasoning about important program properties, whether they’re used for correctness, security, or performance. It also establishes a more robust and convenient separation of responsibilities among the different layers — hardware, OS, JVM — over which invariants they each maintain.
>
> — Ron



More information about the security-dev mailing list