-
Enhancement
-
Resolution: Fixed
-
P4
-
1.4.0, 1.4.1
-
tiger
-
generic, x86
-
solaris_8, windows_nt, windows_2000
When a signed applet is verified and the certificate has expired, there is no way to tell if the applet was signed when the certificate was still valid. The
current validation policy assumes applet to be untrusted if the certificate has
expired, but they cause side effect to well deployed massive application to
popup security warning unnecessary.
Solution: Build timestamping directly into signing tool, so validation process
may take place in Java Plug-in or Java Web Start by validating the timestamp.
Timestamping of signed jar files is covered in 4500302
- relates to
-
JDK-4649690 Java Plug-in should consider time-of-signing when verifying signed jars
- Resolved
-
JDK-4500302 Verification of signed jars does not consider time-of-signing.
- Resolved
-
JDK-4649703 Web Start should consider time-of-signing when verifying signed jars
- Resolved