Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-8156985

Security Administration Guide

XMLWordPrintable

    • Icon: Enhancement Enhancement
    • Resolution: Unresolved
    • Icon: P4 P4
    • tbd
    • None
    • docs

      Algorithms evolve and previously strong ones become weak and obsolete. Sometimes we disable them, sometimes we don't recommend them. We see this in TLS ciphersuites, CertPath algorithms, default and supported algorithms of keytool and jarsigner, and allow_weak_crypto of Kerberos encryption types. We need a centralized place to describe all of them and the principal we are following as a security guide.

            rgallard Raymond Gallardo
            weijun Weijun Wang
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated: