JEP 486: Secondary effects of having a security manager installed?
Mikael Sterner
msterner at openjdk.mxy.se
Thu Nov 7 19:06:43 UTC 2024
Hi!
I miss a more complete discussion in JEP 486 about the secondary effects
of having a security manager installed other than achieving sandboxing,
if they should be possible to achieve when a security manager cannot be
installed or if they should be considered as not important going forward.
For example, there seems to have been an ambition to reduce information leakage
in exceptions when a security manager is enabled, indicated by this comment and
behavior:
https://github.com/openjdk/jdk/blob/f2316f6829c9b671e992401ee39d7a1a1805857e/src/java.base/share/classes/java/nio/file/TempFileHelper.java#L127
The scenario I have in mind is transforming an application, that currently uses
the security manager for sandboxing of untrusted code, to instead use OS level
sandboxing, which in itself seems straightforward. Should such an application
now consider exposing exception details as more prone to information leakage?
Or will there in general be a way to keep those information leakage mitigations
in place, to not have to make an active security decision here?
Maybe the ambition to reduce information leakage with a security manager enabled
was never documented, and maybe it wasn't very effective. Maybe exposing
exception details always carried such a big information leakage risk that the
few mitigations never made a practical difference. Either way it would be good
to discuss it in relation to JEP 486 to guide developers transitioning from
having a security manager enabled.
Yours,
Mikael Sterner
More information about the security-dev
mailing list