-
Enhancement
-
Resolution: Unresolved
-
P3
-
None
-
None
-
Cause Known
The current key manager is SunX509, which is configured in the java.security. The SunX509 algorithm does not check of the local certificate, and there are known problems if there are multiple certificates in the local key store (see JDK-8199440). The PKIX algorithm should be preferred now so that the default key manager could be more robust.
java.security:
- ssl.KeyManagerFactory.algorithm=SunX509
+ ssl.KeyManagerFactory.algorithm=PKIX
java.security:
- ssl.KeyManagerFactory.algorithm=SunX509
+ ssl.KeyManagerFactory.algorithm=PKIX
- blocks
-
JDK-8136720 The PKIX KeyManagerFactory algorithm is underspecified
-
- Open
-
- csr for
-
JDK-8355219 Change the default key manager to PKIX
-
- Draft
-
- relates to
-
JDK-8353113 Peer supported certificate signature algorithms are not being checked with default SunX509 key manager
-
- In Progress
-
-
JDK-8199440 JDK selects wrong certificate during two-way SSL handshake
-
- Closed
-
-
JDK-8322767 TLS full handshake is slow with PKCS12KeyStore and X509KeyManagerImpl
-
- Open
-
- links to
-
Review(master) openjdk/jdk/24756
(1 links to)