< prev index next >

src/share/lib/security/java.security-solaris

Print this page
rev 13454 : 8207258: Distrust TLS server certificates anchored by Symantec Root CAs
Reviewed-by: shade
rev 13455 : 8216280: Allow later Symantec Policy distrust date for two Apple SubCAs
Reviewed-by: shade


 961 # It is not guaranteed to be examined and used by other implementations.
 962 #
 963 #com.sun.CORBA.ORBIorTypeCheckRegistryFilter=binary_class_name;binary_class_name
 964 
 965 #
 966 # JCEKS Encrypted Key Serial Filter
 967 #
 968 # This filter, if configured, is used by the JCEKS KeyStore during the
 969 # deserialization of the encrypted Key object stored inside a key entry.
 970 # If not configured or the filter result is UNDECIDED (i.e. none of the patterns
 971 # matches), the filter configured by jdk.serialFilter will be consulted.
 972 #
 973 # If the system property jceks.key.serialFilter is also specified, it supersedes
 974 # the security property value defined here.
 975 #
 976 # The filter pattern uses the same format as jdk.serialFilter. The default
 977 # pattern allows java.lang.Enum, java.security.KeyRep, java.security.KeyRep$Type,
 978 # and javax.crypto.spec.SecretKeySpec and rejects all the others.
 979 jceks.key.serialFilter = java.lang.Enum;java.security.KeyRep;\
 980   java.security.KeyRep$Type;javax.crypto.spec.SecretKeySpec;!*
































 961 # It is not guaranteed to be examined and used by other implementations.
 962 #
 963 #com.sun.CORBA.ORBIorTypeCheckRegistryFilter=binary_class_name;binary_class_name
 964 
 965 #
 966 # JCEKS Encrypted Key Serial Filter
 967 #
 968 # This filter, if configured, is used by the JCEKS KeyStore during the
 969 # deserialization of the encrypted Key object stored inside a key entry.
 970 # If not configured or the filter result is UNDECIDED (i.e. none of the patterns
 971 # matches), the filter configured by jdk.serialFilter will be consulted.
 972 #
 973 # If the system property jceks.key.serialFilter is also specified, it supersedes
 974 # the security property value defined here.
 975 #
 976 # The filter pattern uses the same format as jdk.serialFilter. The default
 977 # pattern allows java.lang.Enum, java.security.KeyRep, java.security.KeyRep$Type,
 978 # and javax.crypto.spec.SecretKeySpec and rejects all the others.
 979 jceks.key.serialFilter = java.lang.Enum;java.security.KeyRep;\
 980   java.security.KeyRep$Type;javax.crypto.spec.SecretKeySpec;!*
 981 
 982 #
 983 # Policies for distrusting Certificate Authorities (CAs).
 984 #
 985 # This is a comma separated value of one or more case-sensitive strings, each
 986 # of which represents a policy for determining if a CA should be distrusted.
 987 # The supported values are:
 988 #
 989 #
 990 #   SYMANTEC_TLS : Distrust TLS Server certificates anchored by a Symantec
 991 #   root CA and issued after April 16, 2019 unless issued by one of the
 992 #   following subordinate CAs which have a later distrust date:
 993 #     1. Apple IST CA 2 - G1, SHA-256 fingerprint:
 994 #        AC2B922ECFD5E01711772FEA8ED372DE9D1E2245FCE3F57A9CDBEC77296A424B
 995 #        Distrust after December 31, 2019.
 996 #     2. Apple IST CA 8 - G1, SHA-256 fingerprint:
 997 #        A4FE7C7F15155F3F0AEF7AAA83CF6E06DEB97CA3F909DF920AC1490882D488ED
 998 #        Distrust after December 31, 2019.
 999 # Leading and trailing whitespace surrounding each value are ignored.
1000 # Unknown values are ignored. If the property is commented out or set to the
1001 # empty String, no policies are enforced.
1002 #
1003 # Note: This property is currently used by the JDK Reference implementation.
1004 # It is not guaranteed to be supported by other SE implementations. Also, this
1005 # property does not override other security properties which can restrict
1006 # certificates such as jdk.tls.disabledAlgorithms or
1007 # jdk.certpath.disabledAlgorithms; those restrictions are still enforced even
1008 # if this property is not enabled.
1009 #
1010 jdk.security.caDistrustPolicies=SYMANTEC_TLS
< prev index next >