Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-8156985

Security Administration Guide

    XMLWordPrintable

    Details

    • Type: Enhancement
    • Status: Open
    • Priority: P4
    • Resolution: Unresolved
    • Affects Version/s: None
    • Fix Version/s: tbd
    • Component/s: docs
    • Labels:

      Description

      Algorithms evolve and previously strong ones become weak and obsolete. Sometimes we disable them, sometimes we don't recommend them. We see this in TLS ciphersuites, CertPath algorithms, default and supported algorithms of keytool and jarsigner, and allow_weak_crypto of Kerberos encryption types. We need a centralized place to describe all of them and the principal we are following as a security guide.

        Attachments

          Issue Links

            Activity

              People

              Assignee:
              rgallard Raymond Gallardo
              Reporter:
              weijun Weijun Wang
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Dates

                Due:
                Created:
                Updated: