962 # It is not guaranteed to be examined and used by other implementations.
963 #
964 #com.sun.CORBA.ORBIorTypeCheckRegistryFilter=binary_class_name;binary_class_name
965
966 #
967 # JCEKS Encrypted Key Serial Filter
968 #
969 # This filter, if configured, is used by the JCEKS KeyStore during the
970 # deserialization of the encrypted Key object stored inside a key entry.
971 # If not configured or the filter result is UNDECIDED (i.e. none of the patterns
972 # matches), the filter configured by jdk.serialFilter will be consulted.
973 #
974 # If the system property jceks.key.serialFilter is also specified, it supersedes
975 # the security property value defined here.
976 #
977 # The filter pattern uses the same format as jdk.serialFilter. The default
978 # pattern allows java.lang.Enum, java.security.KeyRep, java.security.KeyRep$Type,
979 # and javax.crypto.spec.SecretKeySpec and rejects all the others.
980 jceks.key.serialFilter = java.lang.Enum;java.security.KeyRep;\
981 java.security.KeyRep$Type;javax.crypto.spec.SecretKeySpec;!*
|
962 # It is not guaranteed to be examined and used by other implementations.
963 #
964 #com.sun.CORBA.ORBIorTypeCheckRegistryFilter=binary_class_name;binary_class_name
965
966 #
967 # JCEKS Encrypted Key Serial Filter
968 #
969 # This filter, if configured, is used by the JCEKS KeyStore during the
970 # deserialization of the encrypted Key object stored inside a key entry.
971 # If not configured or the filter result is UNDECIDED (i.e. none of the patterns
972 # matches), the filter configured by jdk.serialFilter will be consulted.
973 #
974 # If the system property jceks.key.serialFilter is also specified, it supersedes
975 # the security property value defined here.
976 #
977 # The filter pattern uses the same format as jdk.serialFilter. The default
978 # pattern allows java.lang.Enum, java.security.KeyRep, java.security.KeyRep$Type,
979 # and javax.crypto.spec.SecretKeySpec and rejects all the others.
980 jceks.key.serialFilter = java.lang.Enum;java.security.KeyRep;\
981 java.security.KeyRep$Type;javax.crypto.spec.SecretKeySpec;!*
982
983 #
984 # Policies for distrusting Certificate Authorities (CAs).
985 #
986 # This is a comma separated value of one or more case-sensitive strings, each
987 # of which represents a policy for determining if a CA should be distrusted.
988 # The supported values are:
989 #
990 #
991 # SYMANTEC_TLS : Distrust TLS Server certificates anchored by a Symantec
992 # root CA and issued after April 16, 2019 unless issued by one of the
993 # following subordinate CAs which have a later distrust date:
994 # 1. Apple IST CA 2 - G1, SHA-256 fingerprint:
995 # AC2B922ECFD5E01711772FEA8ED372DE9D1E2245FCE3F57A9CDBEC77296A424B
996 # Distrust after December 31, 2019.
997 # 2. Apple IST CA 8 - G1, SHA-256 fingerprint:
998 # A4FE7C7F15155F3F0AEF7AAA83CF6E06DEB97CA3F909DF920AC1490882D488ED
999 # Distrust after December 31, 2019.
1000 # Leading and trailing whitespace surrounding each value are ignored.
1001 # Unknown values are ignored. If the property is commented out or set to the
1002 # empty String, no policies are enforced.
1003 #
1004 # Note: This property is currently used by the JDK Reference implementation.
1005 # It is not guaranteed to be supported by other SE implementations. Also, this
1006 # property does not override other security properties which can restrict
1007 # certificates such as jdk.tls.disabledAlgorithms or
1008 # jdk.certpath.disabledAlgorithms; those restrictions are still enforced even
1009 # if this property is not enabled.
1010 #
1011 jdk.security.caDistrustPolicies=SYMANTEC_TLS
|