--- old/src/java.base/share/classes/java/net/NetPermission.java 2017-07-11 14:33:42.516504835 -0700 +++ new/src/java.base/share/classes/java/net/NetPermission.java 2017-07-11 14:33:42.316496108 -0700 @@ -51,14 +51,14 @@ * Permission target name, what the permission allows, and associated risks * * - * Permission Target Name - * What the Permission Allows - * Risks of Allowing this Permission + * Permission Target Name + * What the Permission Allows + * Risks of Allowing this Permission * * * * - * allowHttpTrace + * allowHttpTrace * The ability to use the HTTP TRACE method in HttpURLConnection. * Malicious code using HTTP TRACE could get access to security sensitive * information in the HTTP headers (such as cookies) that it might not @@ -66,7 +66,7 @@ * * * - * getCookieHandler + * getCookieHandler * The ability to get the cookie handler that processes highly * security sensitive cookie information for an Http session. * Malicious code can get a cookie handler to obtain access to @@ -76,14 +76,14 @@ * * * - * getNetworkInformation + * getNetworkInformation * The ability to retrieve all information about local network interfaces. * Malicious code can read information about network hardware such as * MAC addresses, which could be used to construct local IPv6 addresses. * * * - * getProxySelector + * getProxySelector * The ability to get the proxy selector used to make decisions * on which proxies to use when making network connections. * Malicious code can get a ProxySelector to discover proxy @@ -92,7 +92,7 @@ * * * - * getResponseCache + * getResponseCache * The ability to get the response cache that provides * access to a local response cache. * Malicious code getting access to the local response cache @@ -100,7 +100,7 @@ * * * - * requestPasswordAuthentication + * requestPasswordAuthentication * The ability * to ask the authenticator registered with the system for * a password @@ -108,7 +108,7 @@ * * * - * setCookieHandler + * setCookieHandler * The ability to set the cookie handler that processes highly * security sensitive cookie information for an Http session. * Malicious code can set a cookie handler to obtain access to @@ -118,7 +118,7 @@ * * * - * setDefaultAuthenticator + * setDefaultAuthenticator * The ability to set the * way authentication information is retrieved when * a proxy or HTTP server asks for authentication @@ -128,7 +128,7 @@ * * * - * setProxySelector + * setProxySelector * The ability to set the proxy selector used to make decisions * on which proxies to use when making network connections. * Malicious code can set a ProxySelector that directs network @@ -136,7 +136,7 @@ * * * - * setResponseCache + * setResponseCache * The ability to set the response cache that provides access to * a local response cache. * Malicious code getting access to the local response cache @@ -145,7 +145,7 @@ * * * - * specifyStreamHandler + * specifyStreamHandler * The ability * to specify a stream handler when constructing a URL * Malicious code may create a URL with resources that it would