SSLContext instances

Sean Mullan sean.mullan at oracle.com
Thu Mar 13 19:03:46 UTC 2025


Hello,

Thanks for your interest in Java Security technology.

> There is also a method SSLContext.setDefault(SSLContext) [3], whose jdk 
> 17 implementation has a permission check (setDefaultSSLContext) to 
> prevent access to calling setDefault.
> 
> With security manager deprecation/removal,  could this create security 
> issues for JVM-based environments?    Particularly modular/dynamic 
> systems? (e.g. OSGi, JPMS)

Have you read JEP 411 [1] and JEP 486 [2]? The motivation explains in 
much more detail that the JDK will no longer be responsible for 
protecting access to operations like this from code in your local 
application (i.e. sandboxing). If you are using code that is calling 
this method or other methods that previously had permission checks, then 
you need to more fully understand the security risks of trusting code 
like that.

--Sean

[1] https://openjdk.org/jeps/411
[2] https://openjdk.org/jeps/486

> 
> Thanks,
> 
> Scott
> 
> [1] https://docs.oracle.com/en/java/javase/17/docs/api/java.base/javax/ 
> net/ssl/ 
> SSLContext.html#init(javax.net.ssl.KeyManager%5B%5D,javax.net.ssl.TrustManager%5B%5D,java.security.SecureRandom)
> 
> [2] https://docs.oracle.com/en/java/javase/17/docs/api/java.base/javax/ 
> net/ssl/SSLContext.html
> 
> [3] https://docs.oracle.com/en/java/javase/17/docs/api/java.base/javax/ 
> net/ssl/SSLContext.html#setDefault(javax.net.ssl.SSLContext)
> 
> 



More information about the security-dev mailing list