Hello,

Thanks for your interest in Java Security technology.

There is also a method SSLContext.setDefault(SSLContext) [3], whose jdk 17 implementation has a permission check (setDefaultSSLContext) to prevent access to calling setDefault.

With security manager deprecation/removal,  could this create security issues for JVM-based environments?    Particularly modular/dynamic systems? (e.g. OSGi, JPMS)

Have you read JEP 411 [1] and JEP 486 [2]? The motivation explains in much more detail that the JDK will no longer be responsible for protecting access to operations like this from code in your local application (i.e. sandboxing). If you are using code that is calling this method or other methods that previously had permission checks, then you need to more fully understand the security risks of trusting code like that.

--Sean

[1] https://openjdk.org/jeps/411
[2] https://openjdk.org/jeps/486


Thanks,

Scott

[1] https://docs.oracle.com/en/java/javase/17/docs/api/java.base/javax/ net/ssl/ SSLContext.html#init(javax.net.ssl.KeyManager%5B%5D,javax.net.ssl.TrustManager%5B%5D,java.security.SecureRandom)

[2] https://docs.oracle.com/en/java/javase/17/docs/api/java.base/javax/ net/ssl/SSLContext.html

[3] https://docs.oracle.com/en/java/javase/17/docs/api/java.base/javax/ net/ssl/SSLContext.html#setDefault(javax.net.ssl.SSLContext)



Reply via email to