author | xuelei |
Wed, 18 May 2016 22:55:35 +0000 | |
changeset 38419 | 5201cc2ca81d |
parent 37896 | cd841af7dcd0 |
child 38435 | 292ad46c1bf1 |
permissions | -rw-r--r-- |
2 | 1 |
# |
2 |
# This is the "master security properties file". |
|
3 |
# |
|
13159
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
4 |
# An alternate java.security properties file may be specified |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
5 |
# from the command line via the system property |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
6 |
# |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
7 |
# -Djava.security.properties=<URL> |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
8 |
# |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
9 |
# This properties file appends to the master security properties file. |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
10 |
# If both properties files specify values for the same key, the value |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
11 |
# from the command-line properties file is selected, as it is the last |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
12 |
# one loaded. |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
13 |
# |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
14 |
# Also, if you specify |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
15 |
# |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
16 |
# -Djava.security.properties==<URL> (2 equals), |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
17 |
# |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
18 |
# then that properties file completely overrides the master security |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
19 |
# properties file. |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
20 |
# |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
21 |
# To disable the ability to specify an additional properties file from |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
22 |
# the command line, set the key security.overridePropertiesFile |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
23 |
# to false in the master security properties file. It is set to true |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
24 |
# by default. |
b2bf5f74dd06
7133344: Document the java.security.properties system property feature in the java.security file
mullan
parents:
13046
diff
changeset
|
25 |
|
2 | 26 |
# In this file, various security properties are set for use by |
27 |
# java.security classes. This is where users can statically register |
|
28 |
# Cryptography Package Providers ("providers" for short). The term |
|
29 |
# "provider" refers to a package or set of packages that supply a |
|
30 |
# concrete implementation of a subset of the cryptography aspects of |
|
31 |
# the Java Security API. A provider may, for example, implement one or |
|
32 |
# more digital signature algorithms or message digest algorithms. |
|
33 |
# |
|
34 |
# Each provider must implement a subclass of the Provider class. |
|
35 |
# To register a provider in this master security properties file, |
|
36 |
# specify the Provider subclass name and priority in the format |
|
37 |
# |
|
38 |
# security.provider.<n>=<className> |
|
39 |
# |
|
40 |
# This declares a provider, and specifies its preference |
|
41 |
# order n. The preference order is the order in which providers are |
|
42 |
# searched for requested algorithms (when no specific provider is |
|
43 |
# requested). The order is 1-based; 1 is the most preferred, followed |
|
44 |
# by 2, and so on. |
|
45 |
# |
|
46 |
# <className> must specify the subclass of the Provider class whose |
|
47 |
# constructor sets the values of various properties that are required |
|
48 |
# for the Java Security API to look up the algorithms or other |
|
49 |
# facilities implemented by the provider. |
|
50 |
# |
|
51 |
# There must be at least one provider specification in java.security. |
|
52 |
# There is a default provider that comes standard with the JDK. It |
|
53 |
# is called the "SUN" provider, and its Provider subclass |
|
54 |
# named Sun appears in the sun.security.provider package. Thus, the |
|
55 |
# "SUN" provider is registered via the following: |
|
56 |
# |
|
57 |
# security.provider.1=sun.security.provider.Sun |
|
58 |
# |
|
59 |
# (The number 1 is used for the default provider.) |
|
60 |
# |
|
61 |
# Note: Providers can be dynamically registered instead by calls to |
|
62 |
# either the addProvider or insertProviderAt method in the Security |
|
63 |
# class. |
|
64 |
||
65 |
# |
|
66 |
# List of providers and their preference orders (see above): |
|
67 |
# |
|
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
68 |
#ifdef solaris |
36511 | 69 |
security.provider.tbd=OracleUcrypto |
70 |
security.provider.tbd=SunPKCS11 ${java.home}/conf/security/sunpkcs11-solaris.cfg |
|
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
71 |
#endif |
36511 | 72 |
security.provider.tbd=SUN |
73 |
security.provider.tbd=SunRsaSign |
|
74 |
security.provider.tbd=SunEC |
|
75 |
security.provider.tbd=SunJSSE |
|
76 |
security.provider.tbd=SunJCE |
|
77 |
security.provider.tbd=SunJGSS |
|
78 |
security.provider.tbd=SunSASL |
|
79 |
security.provider.tbd=XMLDSig |
|
80 |
security.provider.tbd=SunPCSC |
|
81 |
security.provider.tbd=JdkLDAP |
|
82 |
security.provider.tbd=JdkSASL |
|
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
83 |
#ifdef windows |
36511 | 84 |
security.provider.tbd=SunMSCAPI |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
85 |
#endif |
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
86 |
#ifdef macosx |
36511 | 87 |
security.provider.tbd=Apple |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
88 |
#endif |
31270
e6470b24700d
7191662: JCE providers should be located via ServiceLoader
valeriep
parents:
30904
diff
changeset
|
89 |
#ifndef solaris |
36511 | 90 |
security.provider.tbd=SunPKCS11 |
31270
e6470b24700d
7191662: JCE providers should be located via ServiceLoader
valeriep
parents:
30904
diff
changeset
|
91 |
#endif |
e6470b24700d
7191662: JCE providers should be located via ServiceLoader
valeriep
parents:
30904
diff
changeset
|
92 |
|
33241
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
93 |
# |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
94 |
# A list of preferred providers for specific algorithms. These providers will |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
95 |
# be searched for matching algorithms before the list of registered providers. |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
96 |
# Entries containing errors (parsing, etc) will be ignored. Use the |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
97 |
# -Djava.security.debug=jca property to debug these errors. |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
98 |
# |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
99 |
# The property is a comma-separated list of serviceType.algorithm:provider |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
100 |
# entries. The serviceType (example: "MessageDigest") is optional, and if |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
101 |
# not specified, the algorithm applies to all service types that support it. |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
102 |
# The algorithm is the standard algorithm name or transformation. |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
103 |
# Transformations can be specified in their full standard name |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
104 |
# (ex: AES/CBC/PKCS5Padding), or as partial matches (ex: AES, AES/CBC). |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
105 |
# The provider is the name of the provider. Any provider that does not |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
106 |
# also appear in the registered list will be ignored. |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
107 |
# |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
108 |
# Example: |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
109 |
# jdk.security.provider.preferred=AES/GCM/NoPadding:SunJCE, \ |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
110 |
# MessageDigest.SHA-256:SUN |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
111 |
#ifdef solaris-sparc |
35643
ada9a798efee
8145344: Add SHA1 and SHA-224 to preferred provider list for solaris-sparc
ascarpino
parents:
35298
diff
changeset
|
112 |
jdk.security.provider.preferred=AES:SunJCE, SHA1:SUN, SHA-224:SUN, \ |
ada9a798efee
8145344: Add SHA1 and SHA-224 to preferred provider list for solaris-sparc
ascarpino
parents:
35298
diff
changeset
|
113 |
SHA-256:SUN, SHA-384:SUN, SHA-512:SUN |
33241
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
114 |
#endif |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
115 |
#ifdef solaris-x86 |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
116 |
jdk.security.provider.preferred=AES:SunJCE, RSA:SunRsaSign |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
117 |
#endif |
27eb2d6abda9
8133151: Preferred provider configuration for JCE
ascarpino
parents:
32292
diff
changeset
|
118 |
|
2 | 119 |
|
120 |
# |
|
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
121 |
# Sun Provider SecureRandom seed source. |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
122 |
# |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
123 |
# Select the primary source of seed data for the "NativePRNG", "SHA1PRNG" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
124 |
# and "DRBG" SecureRandom implementations in the "Sun" provider. |
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
125 |
# (Other SecureRandom implementations might also use this property.) |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
126 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
127 |
# On Unix-like systems (for example, Solaris/Linux/MacOS), the |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
128 |
# "NativePRNG", "SHA1PRNG" and "DRBG" implementations obtains seed data from |
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
129 |
# special device files such as file:/dev/random. |
2 | 130 |
# |
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
131 |
# On Windows systems, specifying the URLs "file:/dev/random" or |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
132 |
# "file:/dev/urandom" will enable the native Microsoft CryptoAPI seeding |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
133 |
# mechanism for SHA1PRNG and DRBG. |
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
134 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
135 |
# By default, an attempt is made to use the entropy gathering device |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
136 |
# specified by the "securerandom.source" Security property. If an |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
137 |
# exception occurs while accessing the specified URL: |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
138 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
139 |
# NativePRNG: |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
140 |
# a default value of /dev/random will be used. If neither |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
141 |
# are available, the implementation will be disabled. |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
142 |
# "file" is the only currently supported protocol type. |
2 | 143 |
# |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
144 |
# SHA1PRNG and DRBG: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
145 |
# the traditional system/thread activity algorithm will be used. |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
146 |
# |
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
147 |
# The entropy gathering device can also be specified with the System |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
148 |
# property "java.security.egd". For example: |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
149 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
150 |
# % java -Djava.security.egd=file:/dev/random MainClass |
2 | 151 |
# |
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
152 |
# Specifying this System property will override the |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
153 |
# "securerandom.source" Security property. |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
154 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
155 |
# In addition, if "file:/dev/random" or "file:/dev/urandom" is |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
156 |
# specified, the "NativePRNG" implementation will be more preferred than |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
157 |
# DRBG and SHA1PRNG in the Sun provider. |
2 | 158 |
# |
16915
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
159 |
securerandom.source=file:/dev/random |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
160 |
|
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
161 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
162 |
# A list of known strong SecureRandom implementations. |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
163 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
164 |
# To help guide applications in selecting a suitable strong |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
165 |
# java.security.SecureRandom implementation, Java distributions should |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
166 |
# indicate a list of known strong implementations using the property. |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
167 |
# |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
168 |
# This is a comma-separated list of algorithm and/or algorithm:provider |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
169 |
# entries. |
675d1569af3e
6425477: Better support for generation of high entropy random numbers
wetmore
parents:
16744
diff
changeset
|
170 |
# |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
171 |
#ifdef windows |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
172 |
securerandom.strongAlgorithms=Windows-PRNG:SunMSCAPI,DRBG:SUN |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
173 |
#endif |
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
174 |
#ifndef windows |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
175 |
securerandom.strongAlgorithms=NativePRNGBlocking:SUN,DRBG:SUN |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
176 |
#endif |
2 | 177 |
|
178 |
# |
|
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
179 |
# Sun provider DRBG configuration and default instantiation request. |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
180 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
181 |
# NIST SP 800-90Ar1 lists several DRBG mechanisms. Each can be configured |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
182 |
# with a DRBG algorithm name, and can be instantiated with a security strength, |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
183 |
# prediction resistance support, etc. This property defines the configuration |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
184 |
# and the default instantiation request of "DRBG" SecureRandom implementations |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
185 |
# in the SUN provider. (Other DRBG implementations can also use this property.) |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
186 |
# Applications can request different instantiation parameters like security |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
187 |
# strength, capability, personalization string using one of the |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
188 |
# getInstance(...,SecureRandomParameters,...) methods with a |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
189 |
# DrbgParameters.Instantiation argument, but other settings such as the |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
190 |
# mechanism and DRBG algorithm names are not currently configurable by any API. |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
191 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
192 |
# Please note that the SUN implementation of DRBG always supports reseeding. |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
193 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
194 |
# The value of this property is a comma-separated list of all configurable |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
195 |
# aspects. The aspects can appear in any order but the same aspect can only |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
196 |
# appear at most once. Its BNF-style definition is: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
197 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
198 |
# Value: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
199 |
# aspect { "," aspect } |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
200 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
201 |
# aspect: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
202 |
# mech_name | algorithm_name | strength | capability | df |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
203 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
204 |
# // The DRBG mechanism to use. Default "Hash_DRBG" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
205 |
# mech_name: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
206 |
# "Hash_DRBG" | "HMAC_DRBG" | "CTR_DRBG" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
207 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
208 |
# // The DRBG algorithm name. The "SHA-***" names are for Hash_DRBG and |
37896
cd841af7dcd0
8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG
weijun
parents:
37796
diff
changeset
|
209 |
# // HMAC_DRBG, default "SHA-256". The "AES-***" names are for CTR_DRBG, |
cd841af7dcd0
8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG
weijun
parents:
37796
diff
changeset
|
210 |
# // default "AES-128" when using the limited cryptographic or "AES-256" |
cd841af7dcd0
8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG
weijun
parents:
37796
diff
changeset
|
211 |
# // when using the unlimited. |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
212 |
# algorithm_name: |
37896
cd841af7dcd0
8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG
weijun
parents:
37796
diff
changeset
|
213 |
# "SHA-224" | "SHA-512/224" | "SHA-256" | |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
214 |
# "SHA-512/256" | "SHA-384" | "SHA-512" | |
37896
cd841af7dcd0
8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG
weijun
parents:
37796
diff
changeset
|
215 |
# "AES-128" | "AES-192" | "AES-256" |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
216 |
# |
37896
cd841af7dcd0
8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG
weijun
parents:
37796
diff
changeset
|
217 |
# // Security strength requested. Default "128" |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
218 |
# strength: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
219 |
# "112" | "128" | "192" | "256" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
220 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
221 |
# // Prediction resistance and reseeding request. Default "none" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
222 |
# // "pr_and_reseed" - Both prediction resistance and reseeding |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
223 |
# // support requested |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
224 |
# // "reseed_only" - Only reseeding support requested |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
225 |
# // "none" - Neither prediction resistance not reseeding |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
226 |
# // support requested |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
227 |
# pr: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
228 |
# "pr_and_reseed" | "reseed_only" | "none" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
229 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
230 |
# // Whether a derivation function should be used. only applicable |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
231 |
# // to CTR_DRBG. Default "use_df" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
232 |
# df: |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
233 |
# "use_df" | "no_df" |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
234 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
235 |
# Examples, |
37896
cd841af7dcd0
8156213: Remove SHA-1 and 3KeyTDEA algorithms from DRBG
weijun
parents:
37796
diff
changeset
|
236 |
# securerandom.drbg.config=Hash_DRBG,SHA-224,112,none |
37796
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
237 |
# securerandom.drbg.config=CTR_DRBG,AES-256,192,pr_and_reseed,use_df |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
238 |
# |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
239 |
# The default value is an empty string, which is equivalent to |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
240 |
# securerandom.drbg.config=Hash_DRBG,SHA-256,128,none |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
241 |
securerandom.drbg.config= |
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
242 |
|
256c45c4af5d
8051408: NIST SP 800-90A SecureRandom implementations
weijun
parents:
37726
diff
changeset
|
243 |
# |
2 | 244 |
# Class to instantiate as the javax.security.auth.login.Configuration |
245 |
# provider. |
|
246 |
# |
|
19385
a7b34a4b1fcb
8016848: javax_security/auth/login tests fail in compact 1 and 2 profiles
mullan
parents:
18828
diff
changeset
|
247 |
login.configuration.provider=sun.security.provider.ConfigFile |
2 | 248 |
|
249 |
# |
|
250 |
# Default login configuration file |
|
251 |
# |
|
252 |
#login.config.url.1=file:${user.home}/.java.login.config |
|
253 |
||
254 |
# |
|
255 |
# Class to instantiate as the system Policy. This is the name of the class |
|
30444
054604aed79c
8075706: Policy implementation does not allow policy.provider to be on the class path
mullan
parents:
29902
diff
changeset
|
256 |
# that will be used as the Policy object. The system class loader is used to |
054604aed79c
8075706: Policy implementation does not allow policy.provider to be on the class path
mullan
parents:
29902
diff
changeset
|
257 |
# locate this class. |
2 | 258 |
# |
259 |
policy.provider=sun.security.provider.PolicyFile |
|
260 |
||
261 |
# The default is to have a single system-wide policy file, |
|
262 |
# and a policy file in the user's home directory. |
|
27565 | 263 |
policy.url.1=file:${java.home}/conf/security/java.policy |
2 | 264 |
policy.url.2=file:${user.home}/.java.policy |
265 |
||
266 |
# whether or not we expand properties in the policy file |
|
267 |
# if this is set to false, properties (${...}) will not be expanded in policy |
|
268 |
# files. |
|
269 |
policy.expandProperties=true |
|
270 |
||
271 |
# whether or not we allow an extra policy to be passed on the command line |
|
272 |
# with -Djava.security.policy=somefile. Comment out this line to disable |
|
273 |
# this feature. |
|
274 |
policy.allowSystemProperty=true |
|
275 |
||
276 |
# whether or not we look into the IdentityScope for trusted Identities |
|
277 |
# when encountering a 1.1 signed JAR file. If the identity is found |
|
30790
f81f9725a1c6
8065233: Remove Policy provider code that synchronizes on identityPolicyEntries List
mullan
parents:
30506
diff
changeset
|
278 |
# and is trusted, we grant it AllPermission. Note: the default policy |
f81f9725a1c6
8065233: Remove Policy provider code that synchronizes on identityPolicyEntries List
mullan
parents:
30506
diff
changeset
|
279 |
# provider (sun.security.provider.PolicyFile) does not support this property. |
2 | 280 |
policy.ignoreIdentityScope=false |
281 |
||
282 |
# |
|
283 |
# Default keystore type. |
|
284 |
# |
|
28243
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
285 |
keystore.type=pkcs12 |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
286 |
|
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
287 |
# |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
288 |
# Controls compatibility mode for JKS and PKCS12 keystore types. |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
289 |
# |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
290 |
# When set to 'true', both JKS and PKCS12 keystore types support loading |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
291 |
# keystore files in either JKS or PKCS12 format. When set to 'false' the |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
292 |
# JKS keystore type supports loading only JKS keystore files and the PKCS12 |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
293 |
# keystore type supports loading only PKCS12 keystore files. |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
294 |
# |
47080f9ae750
8044445: JEP 229: Create PKCS12 Keystores by Default
vinnie
parents:
27565
diff
changeset
|
295 |
keystore.type.compat=true |
2 | 296 |
|
297 |
# |
|
298 |
# List of comma-separated packages that start with or equal this string |
|
299 |
# will cause a security exception to be thrown when |
|
300 |
# passed to checkPackageAccess unless the |
|
301 |
# corresponding RuntimePermission ("accessClassInPackage."+package) has |
|
302 |
# been granted. |
|
16083 | 303 |
package.access=sun.,\ |
16895 | 304 |
com.sun.xml.internal.,\ |
16083 | 305 |
com.sun.imageio.,\ |
16101
0229685a801f
8004175: Restricted packages added in java.security are missing in java.security-{macosx, solaris, windows}
mchung
parents:
16100
diff
changeset
|
306 |
com.sun.istack.internal.,\ |
16109 | 307 |
com.sun.jmx.,\ |
19600
fce5c0729a1c
8019830: Add com.sun.media.sound to the list of restricted package
mullan
parents:
19385
diff
changeset
|
308 |
com.sun.media.sound.,\ |
22300 | 309 |
com.sun.naming.internal.,\ |
16108
e5fcdadc69b2
8006882: Proxy generated classes in sun.proxy package breaks JMockit
mchung
parents:
16106
diff
changeset
|
310 |
com.sun.proxy.,\ |
21317
176090ca2be7
8021257: com.sun.corba.se.** should be on restricted package list
alanb
parents:
19600
diff
changeset
|
311 |
com.sun.corba.se.,\ |
16894 | 312 |
com.sun.org.apache.bcel.internal.,\ |
313 |
com.sun.org.apache.regexp.internal.,\ |
|
314 |
com.sun.org.apache.xerces.internal.,\ |
|
315 |
com.sun.org.apache.xpath.internal.,\ |
|
316 |
com.sun.org.apache.xalan.internal.extensions.,\ |
|
317 |
com.sun.org.apache.xalan.internal.lib.,\ |
|
318 |
com.sun.org.apache.xalan.internal.res.,\ |
|
319 |
com.sun.org.apache.xalan.internal.templates.,\ |
|
16083 | 320 |
com.sun.org.apache.xalan.internal.utils.,\ |
16894 | 321 |
com.sun.org.apache.xalan.internal.xslt.,\ |
322 |
com.sun.org.apache.xalan.internal.xsltc.cmdline.,\ |
|
323 |
com.sun.org.apache.xalan.internal.xsltc.compiler.,\ |
|
324 |
com.sun.org.apache.xalan.internal.xsltc.trax.,\ |
|
325 |
com.sun.org.apache.xalan.internal.xsltc.util.,\ |
|
326 |
com.sun.org.apache.xml.internal.res.,\ |
|
18240 | 327 |
com.sun.org.apache.xml.internal.security.,\ |
33283 | 328 |
com.sun.org.apache.xml.internal.serializer.dom3.,\ |
16894 | 329 |
com.sun.org.apache.xml.internal.serializer.utils.,\ |
330 |
com.sun.org.apache.xml.internal.utils.,\ |
|
16893 | 331 |
com.sun.org.glassfish.,\ |
27565 | 332 |
com.sun.tools.script.,\ |
16744 | 333 |
com.oracle.xmlns.internal.,\ |
334 |
com.oracle.webservices.internal.,\ |
|
18240 | 335 |
org.jcp.xml.dsig.internal.,\ |
16901 | 336 |
jdk.internal.,\ |
337 |
jdk.nashorn.internal.,\ |
|
25543
6655212b3399
8027144: Review restriction of JAX-WS java packages going to JDK8
mkos
parents:
25390
diff
changeset
|
338 |
jdk.nashorn.tools.,\ |
27565 | 339 |
jdk.tools.jimage.,\ |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
340 |
com.sun.activation.registries.,\ |
32292
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
341 |
com.sun.java.accessibility.util.internal.,\ |
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
342 |
#ifdef windows |
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
343 |
com.sun.java.accessibility.internal.,\ |
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
344 |
#endif |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
345 |
#ifdef macosx |
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
346 |
apple.,\ |
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
347 |
#endif |
2 | 348 |
|
349 |
# |
|
350 |
# List of comma-separated packages that start with or equal this string |
|
351 |
# will cause a security exception to be thrown when |
|
352 |
# passed to checkPackageDefinition unless the |
|
353 |
# corresponding RuntimePermission ("defineClassInPackage."+package) has |
|
354 |
# been granted. |
|
355 |
# |
|
13035 | 356 |
# by default, none of the class loaders supplied with the JDK call |
357 |
# checkPackageDefinition. |
|
2 | 358 |
# |
16083 | 359 |
package.definition=sun.,\ |
16895 | 360 |
com.sun.xml.internal.,\ |
16083 | 361 |
com.sun.imageio.,\ |
16101
0229685a801f
8004175: Restricted packages added in java.security are missing in java.security-{macosx, solaris, windows}
mchung
parents:
16100
diff
changeset
|
362 |
com.sun.istack.internal.,\ |
16109 | 363 |
com.sun.jmx.,\ |
19600
fce5c0729a1c
8019830: Add com.sun.media.sound to the list of restricted package
mullan
parents:
19385
diff
changeset
|
364 |
com.sun.media.sound.,\ |
22300 | 365 |
com.sun.naming.internal.,\ |
16108
e5fcdadc69b2
8006882: Proxy generated classes in sun.proxy package breaks JMockit
mchung
parents:
16106
diff
changeset
|
366 |
com.sun.proxy.,\ |
21317
176090ca2be7
8021257: com.sun.corba.se.** should be on restricted package list
alanb
parents:
19600
diff
changeset
|
367 |
com.sun.corba.se.,\ |
16894 | 368 |
com.sun.org.apache.bcel.internal.,\ |
369 |
com.sun.org.apache.regexp.internal.,\ |
|
370 |
com.sun.org.apache.xerces.internal.,\ |
|
371 |
com.sun.org.apache.xpath.internal.,\ |
|
372 |
com.sun.org.apache.xalan.internal.extensions.,\ |
|
373 |
com.sun.org.apache.xalan.internal.lib.,\ |
|
374 |
com.sun.org.apache.xalan.internal.res.,\ |
|
375 |
com.sun.org.apache.xalan.internal.templates.,\ |
|
16083 | 376 |
com.sun.org.apache.xalan.internal.utils.,\ |
16894 | 377 |
com.sun.org.apache.xalan.internal.xslt.,\ |
378 |
com.sun.org.apache.xalan.internal.xsltc.cmdline.,\ |
|
379 |
com.sun.org.apache.xalan.internal.xsltc.compiler.,\ |
|
380 |
com.sun.org.apache.xalan.internal.xsltc.trax.,\ |
|
381 |
com.sun.org.apache.xalan.internal.xsltc.util.,\ |
|
382 |
com.sun.org.apache.xml.internal.res.,\ |
|
18240 | 383 |
com.sun.org.apache.xml.internal.security.,\ |
33283 | 384 |
com.sun.org.apache.xml.internal.serializer.dom3.,\ |
16894 | 385 |
com.sun.org.apache.xml.internal.serializer.utils.,\ |
386 |
com.sun.org.apache.xml.internal.utils.,\ |
|
16893 | 387 |
com.sun.org.glassfish.,\ |
27565 | 388 |
com.sun.tools.script.,\ |
16744 | 389 |
com.oracle.xmlns.internal.,\ |
390 |
com.oracle.webservices.internal.,\ |
|
18240 | 391 |
org.jcp.xml.dsig.internal.,\ |
16901 | 392 |
jdk.internal.,\ |
393 |
jdk.nashorn.internal.,\ |
|
25543
6655212b3399
8027144: Review restriction of JAX-WS java packages going to JDK8
mkos
parents:
25390
diff
changeset
|
394 |
jdk.nashorn.tools.,\ |
27565 | 395 |
jdk.tools.jimage.,\ |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
396 |
com.sun.activation.registries.,\ |
32292
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
397 |
com.sun.java.accessibility.util.internal.,\ |
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
398 |
#ifdef windows |
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
399 |
com.sun.java.accessibility.internal.,\ |
193f19028af5
8051626: Rework security restrictions of Java Access Bridge and related Utilities
ptbrunet
parents:
31712
diff
changeset
|
400 |
#endif |
25974
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
401 |
#ifdef macosx |
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
402 |
apple.,\ |
850dc36ea410
6997010: Consolidate java.security files into one file with modifications
weijun
parents:
25543
diff
changeset
|
403 |
#endif |
2 | 404 |
|
405 |
# |
|
406 |
# Determines whether this properties file can be appended to |
|
407 |
# or overridden on the command line via -Djava.security.properties |
|
408 |
# |
|
409 |
security.overridePropertiesFile=true |
|
410 |
||
411 |
# |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
412 |
# Determines the default key and trust manager factory algorithms for |
2 | 413 |
# the javax.net.ssl package. |
414 |
# |
|
415 |
ssl.KeyManagerFactory.algorithm=SunX509 |
|
416 |
ssl.TrustManagerFactory.algorithm=PKIX |
|
417 |
||
418 |
# |
|
419 |
# The Java-level namelookup cache policy for successful lookups: |
|
420 |
# |
|
421 |
# any negative value: caching forever |
|
422 |
# any positive value: the number of seconds to cache an address for |
|
423 |
# zero: do not cache |
|
424 |
# |
|
425 |
# default value is forever (FOREVER). For security reasons, this |
|
426 |
# caching is made forever when a security manager is set. When a security |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
427 |
# manager is not set, the default behavior in this implementation |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
428 |
# is to cache for 30 seconds. |
2 | 429 |
# |
430 |
# NOTE: setting this to anything other than the default value can have |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
431 |
# serious security implications. Do not set it unless |
2 | 432 |
# you are sure you are not exposed to DNS spoofing attack. |
433 |
# |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
434 |
#networkaddress.cache.ttl=-1 |
2 | 435 |
|
436 |
# The Java-level namelookup cache policy for failed lookups: |
|
437 |
# |
|
438 |
# any negative value: cache forever |
|
439 |
# any positive value: the number of seconds to cache negative lookup results |
|
440 |
# zero: do not cache |
|
441 |
# |
|
442 |
# In some Microsoft Windows networking environments that employ |
|
443 |
# the WINS name service in addition to DNS, name service lookups |
|
444 |
# that fail may take a noticeably long time to return (approx. 5 seconds). |
|
445 |
# For this reason the default caching policy is to maintain these |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
446 |
# results for 10 seconds. |
2 | 447 |
# |
448 |
# |
|
449 |
networkaddress.cache.negative.ttl=10 |
|
450 |
||
451 |
# |
|
452 |
# Properties to configure OCSP for certificate revocation checking |
|
453 |
# |
|
454 |
||
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
455 |
# Enable OCSP |
2 | 456 |
# |
457 |
# By default, OCSP is not used for certificate revocation checking. |
|
458 |
# This property enables the use of OCSP when set to the value "true". |
|
459 |
# |
|
460 |
# NOTE: SocketPermission is required to connect to an OCSP responder. |
|
461 |
# |
|
462 |
# Example, |
|
463 |
# ocsp.enable=true |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
464 |
|
2 | 465 |
# |
466 |
# Location of the OCSP responder |
|
467 |
# |
|
468 |
# By default, the location of the OCSP responder is determined implicitly |
|
469 |
# from the certificate being validated. This property explicitly specifies |
|
470 |
# the location of the OCSP responder. The property is used when the |
|
26967
c182469301ee
8037550: Update RFC references in javadoc to RFC 5280
juh
parents:
25991
diff
changeset
|
471 |
# Authority Information Access extension (defined in RFC 5280) is absent |
2 | 472 |
# from the certificate or when it requires overriding. |
473 |
# |
|
474 |
# Example, |
|
475 |
# ocsp.responderURL=http://ocsp.example.net:80 |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
476 |
|
2 | 477 |
# |
478 |
# Subject name of the OCSP responder's certificate |
|
479 |
# |
|
480 |
# By default, the certificate of the OCSP responder is that of the issuer |
|
481 |
# of the certificate being validated. This property identifies the certificate |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
482 |
# of the OCSP responder when the default does not apply. Its value is a string |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
483 |
# distinguished name (defined in RFC 2253) which identifies a certificate in |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
484 |
# the set of certificates supplied during cert path validation. In cases where |
2 | 485 |
# the subject name alone is not sufficient to uniquely identify the certificate |
486 |
# then both the "ocsp.responderCertIssuerName" and |
|
487 |
# "ocsp.responderCertSerialNumber" properties must be used instead. When this |
|
488 |
# property is set then those two properties are ignored. |
|
489 |
# |
|
490 |
# Example, |
|
491 |
# ocsp.responderCertSubjectName="CN=OCSP Responder, O=XYZ Corp" |
|
492 |
||
493 |
# |
|
494 |
# Issuer name of the OCSP responder's certificate |
|
495 |
# |
|
496 |
# By default, the certificate of the OCSP responder is that of the issuer |
|
497 |
# of the certificate being validated. This property identifies the certificate |
|
498 |
# of the OCSP responder when the default does not apply. Its value is a string |
|
499 |
# distinguished name (defined in RFC 2253) which identifies a certificate in |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
500 |
# the set of certificates supplied during cert path validation. When this |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
501 |
# property is set then the "ocsp.responderCertSerialNumber" property must also |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
502 |
# be set. When the "ocsp.responderCertSubjectName" property is set then this |
2 | 503 |
# property is ignored. |
504 |
# |
|
505 |
# Example, |
|
506 |
# ocsp.responderCertIssuerName="CN=Enterprise CA, O=XYZ Corp" |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
507 |
|
2 | 508 |
# |
509 |
# Serial number of the OCSP responder's certificate |
|
510 |
# |
|
511 |
# By default, the certificate of the OCSP responder is that of the issuer |
|
512 |
# of the certificate being validated. This property identifies the certificate |
|
513 |
# of the OCSP responder when the default does not apply. Its value is a string |
|
514 |
# of hexadecimal digits (colon or space separators may be present) which |
|
515 |
# identifies a certificate in the set of certificates supplied during cert path |
|
516 |
# validation. When this property is set then the "ocsp.responderCertIssuerName" |
|
517 |
# property must also be set. When the "ocsp.responderCertSubjectName" property |
|
518 |
# is set then this property is ignored. |
|
519 |
# |
|
520 |
# Example, |
|
521 |
# ocsp.responderCertSerialNumber=2A:FF:00 |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
522 |
|
6311
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
523 |
# |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
524 |
# Policy for failed Kerberos KDC lookups: |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
525 |
# |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
526 |
# When a KDC is unavailable (network error, service failure, etc), it is |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
527 |
# put inside a blacklist and accessed less often for future requests. The |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
528 |
# value (case-insensitive) for this policy can be: |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
529 |
# |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
530 |
# tryLast |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
531 |
# KDCs in the blacklist are always tried after those not on the list. |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
532 |
# |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
533 |
# tryLess[:max_retries,timeout] |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
534 |
# KDCs in the blacklist are still tried by their order in the configuration, |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
535 |
# but with smaller max_retries and timeout values. max_retries and timeout |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
536 |
# are optional numerical parameters (default 1 and 5000, which means once |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
537 |
# and 5 seconds). Please notes that if any of the values defined here is |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
538 |
# more than what is defined in krb5.conf, it will be ignored. |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
539 |
# |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
540 |
# Whenever a KDC is detected as available, it is removed from the blacklist. |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
541 |
# The blacklist is reset when krb5.conf is reloaded. You can add |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
542 |
# refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
543 |
# reloaded whenever a JAAS authentication is attempted. |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
544 |
# |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
545 |
# Example, |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
546 |
# krb5.kdc.bad.policy = tryLast |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
547 |
# krb5.kdc.bad.policy = tryLess:2,2000 |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
548 |
krb5.kdc.bad.policy = tryLast |
1448d18935b5
6976536: Solaris JREs do not have the krb5.kdc.bad.policy configured by default.
weijun
parents:
3492
diff
changeset
|
549 |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
550 |
# Algorithm restrictions for certification path (CertPath) processing |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
551 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
552 |
# In some environments, certain algorithms or key lengths may be undesirable |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
553 |
# for certification path building and validation. For example, "MD2" is |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
554 |
# generally no longer considered to be a secure hash algorithm. This section |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
555 |
# describes the mechanism for disabling algorithms based on algorithm name |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
556 |
# and/or key length. This includes algorithms used in certificates, as well |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
557 |
# as revocation information such as CRLs and signed OCSP Responses. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
558 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
559 |
# The syntax of the disabled algorithm string is described as this Java |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
560 |
# BNF-style: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
561 |
# DisabledAlgorithms: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
562 |
# " DisabledAlgorithm { , DisabledAlgorithm } " |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
563 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
564 |
# DisabledAlgorithm: |
37726
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
565 |
# AlgorithmName [Constraint] { '&' Constraint } |
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
566 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
567 |
# AlgorithmName: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
568 |
# (see below) |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
569 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
570 |
# Constraint: |
37726
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
571 |
# KeySizeConstraint, CertConstraint |
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
572 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
573 |
# KeySizeConstraint: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
574 |
# keySize Operator DecimalInteger |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
575 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
576 |
# Operator: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
577 |
# <= | < | == | != | >= | > |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
578 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
579 |
# DecimalInteger: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
580 |
# DecimalDigits |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
581 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
582 |
# DecimalDigits: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
583 |
# DecimalDigit {DecimalDigit} |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
584 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
585 |
# DecimalDigit: one of |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
586 |
# 1 2 3 4 5 6 7 8 9 0 |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
587 |
# |
37726
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
588 |
# CertConstraint |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
589 |
# jdkCA |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
590 |
# |
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
591 |
# The "AlgorithmName" is the standard algorithm name of the disabled |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
592 |
# algorithm. See "Java Cryptography Architecture Standard Algorithm Name |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
593 |
# Documentation" for information about Standard Algorithm Names. Matching |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
594 |
# is performed using a case-insensitive sub-element matching rule. (For |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
595 |
# example, in "SHA1withECDSA" the sub-elements are "SHA1" for hashing and |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
596 |
# "ECDSA" for signatures.) If the assertion "AlgorithmName" is a |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
597 |
# sub-element of the certificate algorithm name, the algorithm will be |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
598 |
# rejected during certification path building and validation. For example, |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
599 |
# the assertion algorithm name "DSA" will disable all certificate algorithms |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
600 |
# that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
601 |
# will not disable algorithms related to "ECDSA". |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
602 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
603 |
# A "Constraint" provides further guidance for the algorithm being specified. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
604 |
# The "KeySizeConstraint" requires a key of a valid size range if the |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
605 |
# "AlgorithmName" is of a key algorithm. The "DecimalInteger" indicates the |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
606 |
# key size specified in number of bits. For example, "RSA keySize <= 1024" |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
607 |
# indicates that any RSA key with key size less than or equal to 1024 bits |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
608 |
# should be disabled, and "RSA keySize < 1024, RSA keySize > 2048" indicates |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
609 |
# that any RSA key with key size less than 1024 or greater than 2048 should |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
610 |
# be disabled. Note that the "KeySizeConstraint" only makes sense to key |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
611 |
# algorithms. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
612 |
# |
37726
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
613 |
# "CertConstraint" specifies additional constraints for |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
614 |
# certificates that contain algorithms that are restricted: |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
615 |
# |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
616 |
# Â Â "jdkCA" prohibits the specified algorithm only if the algorithm is used |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
617 |
# Â Â Â Â in a certificate chain that terminates at a marked trust anchor in the |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
618 |
# Â Â Â Â lib/security/cacerts keystore. Â All other chains are not affected. |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
619 |
# Â Â Â Â If the jdkCA constraint is not set, then all chains using the |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
620 |
# Â Â Â Â specified algorithm are restricted. jdkCA may only be used once in |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
621 |
# a DisabledAlgorithm expression. |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
622 |
# Â Â Â Â Example: Â To apply this constraint to SHA-1 certificates, include |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
623 |
# Â Â Â Â the following: Â "SHA1 jdkCA" |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
624 |
# |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
625 |
# When an algorithm must satisfy more than one constraint, it must be |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
626 |
# delimited by an ampersand '&'. For example, to restrict certificates in a |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
627 |
# chain that terminate at a distribution provided trust anchor and contain |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
628 |
# RSA keys that are less than or equal to 1024 bits, add the following |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
629 |
# constraint: "RSA keySize <= 1024 & jdkCA". |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
630 |
# |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
631 |
# All DisabledAlgorithms expressions are processed in the order defined in the |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
632 |
# property. This requires lower keysize constraints to be specified |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
633 |
# before larger keysize constraints of the same algorithm. For example: |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
634 |
# "RSA keySize < 1024 & jdkCA, RSA keySize < 2048". |
bbecfff95ec3
8140422: Add mechanism to allow non default root CAs to be not subject to algorithm restrictions
ascarpino
parents:
37373
diff
changeset
|
635 |
# |
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
636 |
# Note: This property is currently used by Oracle's PKIX implementation. It |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
637 |
# is not guaranteed to be examined and used by other implementations. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
638 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
639 |
# Example: |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
640 |
# jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048 |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
641 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
642 |
# |
36007
1d78df8f6a94
8139565: Restrict certificates with DSA keys less than 1024 bits
xuelei
parents:
35643
diff
changeset
|
643 |
jdk.certpath.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, \ |
1d78df8f6a94
8139565: Restrict certificates with DSA keys less than 1024 bits
xuelei
parents:
35643
diff
changeset
|
644 |
DSA keySize < 1024 |
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
645 |
|
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
646 |
# Algorithm restrictions for Secure Socket Layer/Transport Layer Security |
30904 | 647 |
# (SSL/TLS/DTLS) processing |
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
648 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
649 |
# In some environments, certain algorithms or key lengths may be undesirable |
30904 | 650 |
# when using SSL/TLS/DTLS. This section describes the mechanism for disabling |
651 |
# algorithms during SSL/TLS/DTLS security parameters negotiation, including |
|
28555 | 652 |
# protocol version negotiation, cipher suites selection, peer authentication |
653 |
# and key exchange mechanisms. |
|
654 |
# |
|
655 |
# Disabled algorithms will not be negotiated for SSL/TLS connections, even |
|
656 |
# if they are enabled explicitly in an application. |
|
7040
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
657 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
658 |
# For PKI-based peer authentication and key exchange mechanisms, this list |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
659 |
# of disabled algorithms will also be checked during certification path |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
660 |
# building and validation, including algorithms used in certificates, as |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
661 |
# well as revocation information such as CRLs and signed OCSP Responses. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
662 |
# This is in addition to the jdk.certpath.disabledAlgorithms property above. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
663 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
664 |
# See the specification of "jdk.certpath.disabledAlgorithms" for the |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
665 |
# syntax of the disabled algorithm string. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
666 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
667 |
# Note: This property is currently used by Oracle's JSSE implementation. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
668 |
# It is not guaranteed to be examined and used by other implementations. |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
669 |
# |
659824c2a550
6792180: Enhance to reject weak algorithms or conform to crypto recommendations
xuelei
parents:
6311
diff
changeset
|
670 |
# Example: |
28555 | 671 |
# jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048 |
36242
956bfe0cb926
8148108: Disable Diffie-Hellman keys less than 1024 bits
xuelei
parents:
36007
diff
changeset
|
672 |
jdk.tls.disabledAlgorithms=SSLv3, RC4, MD5withRSA, DH keySize < 1024 |
31689 | 673 |
|
674 |
# Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS) |
|
675 |
# processing in JSSE implementation. |
|
676 |
# |
|
677 |
# In some environments, a certain algorithm may be undesirable but it |
|
678 |
# cannot be disabled because of its use in legacy applications. Legacy |
|
679 |
# algorithms may still be supported, but applications should not use them |
|
680 |
# as the security strength of legacy algorithms are usually not strong enough |
|
681 |
# in practice. |
|
682 |
# |
|
683 |
# During SSL/TLS security parameters negotiation, legacy algorithms will |
|
684 |
# not be negotiated unless there are no other candidates. |
|
685 |
# |
|
686 |
# The syntax of the disabled algorithm string is described as this Java |
|
687 |
# BNF-style: |
|
688 |
# LegacyAlgorithms: |
|
689 |
# " LegacyAlgorithm { , LegacyAlgorithm } " |
|
690 |
# |
|
691 |
# LegacyAlgorithm: |
|
692 |
# AlgorithmName (standard JSSE algorithm name) |
|
693 |
# |
|
694 |
# See the specification of security property "jdk.certpath.disabledAlgorithms" |
|
695 |
# for the syntax and description of the "AlgorithmName" notation. |
|
696 |
# |
|
697 |
# Per SSL/TLS specifications, cipher suites have the form: |
|
698 |
# SSL_KeyExchangeAlg_WITH_CipherAlg_MacAlg |
|
699 |
# or |
|
700 |
# TLS_KeyExchangeAlg_WITH_CipherAlg_MacAlg |
|
701 |
# |
|
702 |
# For example, the cipher suite TLS_RSA_WITH_AES_128_CBC_SHA uses RSA as the |
|
703 |
# key exchange algorithm, AES_128_CBC (128 bits AES cipher algorithm in CBC |
|
704 |
# mode) as the cipher (encryption) algorithm, and SHA-1 as the message digest |
|
705 |
# algorithm for HMAC. |
|
706 |
# |
|
707 |
# The LegacyAlgorithm can be one of the following standard algorithm names: |
|
708 |
# 1. JSSE cipher suite name, e.g., TLS_RSA_WITH_AES_128_CBC_SHA |
|
709 |
# 2. JSSE key exchange algorithm name, e.g., RSA |
|
710 |
# 3. JSSE cipher (encryption) algorithm name, e.g., AES_128_CBC |
|
31712 | 711 |
# 4. JSSE message digest algorithm name, e.g., SHA |
31689 | 712 |
# |
713 |
# See SSL/TLS specifications and "Java Cryptography Architecture Standard |
|
714 |
# Algorithm Name Documentation" for information about the algorithm names. |
|
715 |
# |
|
38419
5201cc2ca81d
8151856: Note that disabledAlgorithms override the same algorithms of legacyAlgorithms
xuelei
parents:
37896
diff
changeset
|
716 |
# Note: If a legacy algorithm is also restricted through the |
5201cc2ca81d
8151856: Note that disabledAlgorithms override the same algorithms of legacyAlgorithms
xuelei
parents:
37896
diff
changeset
|
717 |
# jdk.tls.disabledAlgorithms property or the |
5201cc2ca81d
8151856: Note that disabledAlgorithms override the same algorithms of legacyAlgorithms
xuelei
parents:
37896
diff
changeset
|
718 |
# java.security.AlgorithmConstraints API (See |
5201cc2ca81d
8151856: Note that disabledAlgorithms override the same algorithms of legacyAlgorithms
xuelei
parents:
37896
diff
changeset
|
719 |
# javax.net.ssl.SSLParameters.setAlgorithmConstraints()), |
5201cc2ca81d
8151856: Note that disabledAlgorithms override the same algorithms of legacyAlgorithms
xuelei
parents:
37896
diff
changeset
|
720 |
# then the algorithm is completely disabled and will not be negotiated. |
5201cc2ca81d
8151856: Note that disabledAlgorithms override the same algorithms of legacyAlgorithms
xuelei
parents:
37896
diff
changeset
|
721 |
# |
31689 | 722 |
# Note: This property is currently used by Oracle's JSSE implementation. |
723 |
# It is not guaranteed to be examined and used by other implementations. |
|
724 |
# There is no guarantee the property will continue to exist or be of the |
|
725 |
# same syntax in future releases. |
|
726 |
# |
|
727 |
# Example: |
|
728 |
# jdk.tls.legacyAlgorithms=DH_anon, DES_CBC, SSL_RSA_WITH_RC4_128_MD5 |
|
729 |
# |
|
730 |
jdk.tls.legacyAlgorithms= \ |
|
731 |
K_NULL, C_NULL, M_NULL, \ |
|
732 |
DHE_DSS_EXPORT, DHE_RSA_EXPORT, DH_anon_EXPORT, DH_DSS_EXPORT, \ |
|
733 |
DH_RSA_EXPORT, RSA_EXPORT, \ |
|
734 |
DH_anon, ECDH_anon, \ |
|
31712 | 735 |
RC4_128, RC4_40, DES_CBC, DES40_CBC |
33295 | 736 |
|
737 |
# The pre-defined default finite field Diffie-Hellman ephemeral (DHE) |
|
738 |
# parameters for Transport Layer Security (SSL/TLS/DTLS) processing. |
|
739 |
# |
|
740 |
# In traditional SSL/TLS/DTLS connections where finite field DHE parameters |
|
741 |
# negotiation mechanism is not used, the server offers the client group |
|
742 |
# parameters, base generator g and prime modulus p, for DHE key exchange. |
|
743 |
# It is recommended to use dynamic group parameters. This property defines |
|
744 |
# a mechanism that allows you to specify custom group parameters. |
|
745 |
# |
|
746 |
# The syntax of this property string is described as this Java BNF-style: |
|
747 |
# DefaultDHEParameters: |
|
748 |
# DefinedDHEParameters { , DefinedDHEParameters } |
|
749 |
# |
|
750 |
# DefinedDHEParameters: |
|
751 |
# "{" DHEPrimeModulus , DHEBaseGenerator "}" |
|
752 |
# |
|
753 |
# DHEPrimeModulus: |
|
754 |
# HexadecimalDigits |
|
755 |
# |
|
756 |
# DHEBaseGenerator: |
|
757 |
# HexadecimalDigits |
|
758 |
# |
|
759 |
# HexadecimalDigits: |
|
760 |
# HexadecimalDigit { HexadecimalDigit } |
|
761 |
# |
|
762 |
# HexadecimalDigit: one of |
|
763 |
# 0 1 2 3 4 5 6 7 8 9 A B C D E F a b c d e f |
|
764 |
# |
|
765 |
# Whitespace characters are ignored. |
|
766 |
# |
|
767 |
# The "DefinedDHEParameters" defines the custom group parameters, prime |
|
768 |
# modulus p and base generator g, for a particular size of prime modulus p. |
|
769 |
# The "DHEPrimeModulus" defines the hexadecimal prime modulus p, and the |
|
770 |
# "DHEBaseGenerator" defines the hexadecimal base generator g of a group |
|
771 |
# parameter. It is recommended to use safe primes for the custom group |
|
772 |
# parameters. |
|
773 |
# |
|
774 |
# If this property is not defined or the value is empty, the underlying JSSE |
|
775 |
# provider's default group parameter is used for each connection. |
|
776 |
# |
|
777 |
# If the property value does not follow the grammar, or a particular group |
|
778 |
# parameter is not valid, the connection will fall back and use the |
|
779 |
# underlying JSSE provider's default group parameter. |
|
780 |
# |
|
781 |
# Note: This property is currently used by OpenJDK's JSSE implementation. It |
|
782 |
# is not guaranteed to be examined and used by other implementations. |
|
783 |
# |
|
784 |
# Example: |
|
785 |
# jdk.tls.server.defaultDHEParameters= |
|
786 |
# { \ |
|
787 |
# FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 \ |
|
788 |
# 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD \ |
|
789 |
# EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 \ |
|
790 |
# E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED \ |
|
791 |
# EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 \ |
|
792 |
# FFFFFFFF FFFFFFFF, 2} |