Additionally JDK-8235540, was a java.security configuration change for JDK7 and JDK8. If you want to re-enable brainpool curves, change the java.disabled.namedCurves and/or jdk.[tls|certpath|jar].disabledAlgorithms properties in the java.security.

One policy won't fit everyone's needs, that's why this particular change was a configuration change only.

Tony


On 12/13/22 5:34 AM, Sean Mullan wrote:


On 12/13/22 2:39 AM, benjamin.marw...@f-i.de wrote:
Hi everyone!

I just stumbled over “Disable weak named curves”, e.g.

• https://bugs.openjdk.org/browse/JDK-8235540
http://cr.openjdk.java.net/~alexsch/sercher/8233228/webrev.00/src/share/lib/security/java.security-aix.udiff.html

Interestingly, brainpoolP512r1 is on that list.
Just a few weeks ago I cited someone from the German BSI who debunked the myth that brainpool ciphers are weak [1]].
They are only weak on TLSv1.3 if used not properly.

Please revert this change ASAP. It will break a lot of cryptography for no reason.
Additionally, JDK-8235540 doesn't even mention how this list was chosen.

The reason for removing the brainpool curves was previously explained in my post: https://mail.openjdk.org/pipermail/security-dev/2022-November/033171.html

As I also said in that post, we would be open to reviewing contributions from the community for reintroducing support for brainpool but they would need to be done using the current design structure and using complete formulas.

Thanks,
Sean


Here's the quote again from Manfred Lochter, how works at the BSI:

The unfortunate wording about the brainpool curves originated in TLS 1.3,
however RFC 8734 makes the curves usable for TLS again.
We will continue to recommend the Brainpool curves.
It should also be noted that the arguments for the "modern formulas" have all been refuted by now. Especially the implementation of Curve 25519 requires more effort to protect against SCA;
the deterministic signatures are vulnerable to fault injection.
In the medium term, however, the switch to post-quantum cryptography is necessary;
there are comprehensive recommendations on this at [2]

Please be aware that other users are already +1'd this [3].

- Ben

[1]: https://mail.openjdk.org/pipermail/security-dev/2022-November/033108.html [2]: https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Quantentechnologien-und-Post-Quanten-Kryptografie/quantentechnologien-und-post-quanten-kryptografie_node.html [3]: https://mail.openjdk.org/pipermail/security-dev/2022-November/033428.html

Reply via email to