Details
-
Sub-task
-
Resolution: Delivered
-
P3
-
7u311, 8u301, 11.0.12-oracle, 11.0.12.0.1-oracle, 16.0.2, 17
-
Verified
Backports
Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build |
---|---|---|---|---|---|---|
JDK-8289173 | 16.0.2 | Clifford Wayne | P3 | Closed | Delivered | |
JDK-8292093 | 11.0.12.0.1-oracle | Sean Mullan | P3 | Resolved | Delivered | |
JDK-8289172 | 11.0.12-oracle | Clifford Wayne | P3 | Closed | Delivered | |
JDK-8289170 | 8u301 | Clifford Wayne | P3 | Closed | Delivered | |
JDK-8289169 | 7u311 | Clifford Wayne | P3 | Closed | Delivered |
Description
JARs signed with SHA-1 algorithms are now restricted by default and treated as if they were unsigned. This applies to the algorithms used to digest, sign, and optionally timestamp the JAR. It also applies to the signature and digest algorithms of the certificates in the certificate chain of the code signer and the Timestamp Authority, and any CRLs or OCSP responses that are used to verify if those certificates have been revoked.
In order to reduce the compatibility risk for applications that have been previously timestamped or use private CAs, there are two exceptions to this policy:
- Any JAR signed with SHA-1 algorithms and timestamped prior to January 01, 2019 will not be restricted.
- Any JAR signed with a SHA-1 certificate that does not chain back to a Root CA included by default in the JDK `cacerts` keystore will not be restricted.
These exceptions may be removed in a future JDK release.
Users can, at their own risk, remove these restrictions by modifying the `java.security` configuration file (or overriding it using the `java.security.properties` system property) and removing "SHA1 jdkCA & usage SignedJAR & denyAfter 2019-01-01" from the `jdk.certpath.disabledAlgorithms` security property and "SHA1 jdkCA & denyAfter 2019-01-01" from the `jdk.jar.disabledAlgorithms` security property.
In order to reduce the compatibility risk for applications that have been previously timestamped or use private CAs, there are two exceptions to this policy:
- Any JAR signed with SHA-1 algorithms and timestamped prior to January 01, 2019 will not be restricted.
- Any JAR signed with a SHA-1 certificate that does not chain back to a Root CA included by default in the JDK `cacerts` keystore will not be restricted.
These exceptions may be removed in a future JDK release.
Users can, at their own risk, remove these restrictions by modifying the `java.security` configuration file (or overriding it using the `java.security.properties` system property) and removing "SHA1 jdkCA & usage SignedJAR & denyAfter 2019-01-01" from the `jdk.certpath.disabledAlgorithms` security property and "SHA1 jdkCA & denyAfter 2019-01-01" from the `jdk.jar.disabledAlgorithms` security property.
Attachments
Issue Links
- backported by
-
JDK-8292093 Release Note: Disable SHA-1 JARs
- Resolved
-
JDK-8289169 Release Note: Disable SHA-1 JARs
- Closed
-
JDK-8289170 Release Note: Disable SHA-1 JARs
- Closed
-
JDK-8289172 Release Note: Disable SHA-1 JARs
- Closed
-
JDK-8289173 Release Note: Disable SHA-1 JARs
- Closed