miniprogram-ci 2.1.17 → 2.1.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. package/CHANGELOG.md +7 -0
  2. package/README.md +9 -2
  3. package/dist/@types/config/config.d.ts +1 -1
  4. package/dist/@types/config/define.d.ts +1 -0
  5. package/dist/@types/index.d.ts +2 -1
  6. package/dist/@types/modules/corecompiler/original/workerThread/config.d.ts +1 -0
  7. package/dist/@types/modules/corecompiler/summerCompiler.d.ts +4 -1
  8. package/dist/@types/modules/index.d.ts +2 -0
  9. package/dist/@types/modules/nativecompiler/ios/buildCloud.d.ts +2 -0
  10. package/dist/@types/modules/nativecompiler/ios/index.d.ts +1 -0
  11. package/dist/@types/schema/@types/appjson.d.ts +3 -1
  12. package/dist/@types/schema/@types/pagejson.d.ts +1 -0
  13. package/dist/@types/schema/@types/projectconfigjson.d.ts +1 -1
  14. package/dist/@types/types/core.d.ts +1 -1
  15. package/dist/@types/utils/debug.d.ts +3 -3
  16. package/dist/@types/utils/miniappJson.d.ts +4 -1
  17. package/dist/@types/utils/packOptionsHelper.d.ts +2 -1
  18. package/dist/ci/android-miniapp-toolkit/dist/index.js +1 -1
  19. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/bin/jar +0 -0
  20. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/bin/jarsigner +0 -0
  21. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/bin/java +0 -0
  22. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/bin/keytool +0 -0
  23. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/net.properties +139 -0
  24. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/java.policy +44 -0
  25. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/java.security +1366 -0
  26. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/policy/README.txt +54 -0
  27. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/policy/limited/default_US_export.policy +6 -0
  28. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/policy/limited/default_local.policy +14 -0
  29. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/policy/limited/exempt_local.policy +13 -0
  30. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/policy/unlimited/default_US_export.policy +6 -0
  31. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/conf/security/policy/unlimited/default_local.policy +6 -0
  32. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/include/classfile_constants.h +582 -0
  33. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/include/darwin/jni_md.h +56 -0
  34. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/include/jni.h +1973 -0
  35. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/include/jvmti.h +2625 -0
  36. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/include/jvmticmlr.h +115 -0
  37. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/ADDITIONAL_LICENSE_INFO +37 -0
  38. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/ASSEMBLY_EXCEPTION +27 -0
  39. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/LICENSE +347 -0
  40. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/aes.md +36 -0
  41. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/asm.md +36 -0
  42. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/c-libutl.md +35 -0
  43. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/cldr.md +66 -0
  44. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/icu.md +66 -0
  45. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/public_suffix.md +399 -0
  46. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/java.base/unicode.md +66 -0
  47. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/jdk.jartool/ADDITIONAL_LICENSE_INFO +37 -0
  48. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/jdk.jartool/ASSEMBLY_EXCEPTION +27 -0
  49. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/legal/jdk.jartool/LICENSE +347 -0
  50. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/classlist +1153 -0
  51. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/jli/libjli.dylib +0 -0
  52. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/jrt-fs.jar +0 -0
  53. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/jspawnhelper +0 -0
  54. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/jvm.cfg +2 -0
  55. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libjava.dylib +0 -0
  56. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libjimage.dylib +0 -0
  57. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libjsig.dylib +0 -0
  58. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libnet.dylib +0 -0
  59. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libnio.dylib +0 -0
  60. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libosxsecurity.dylib +0 -0
  61. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libverify.dylib +0 -0
  62. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/libzip.dylib +0 -0
  63. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/modules +0 -0
  64. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/security/blocked.certs +39 -0
  65. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/security/cacerts +0 -0
  66. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/security/default.policy +222 -0
  67. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/security/public_suffix_list.dat +0 -0
  68. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/server/Xusage.txt +22 -0
  69. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/server/libjsig.dylib +0 -0
  70. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/server/libjvm.dylib +0 -0
  71. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/lib/tzdb.dat +0 -0
  72. package/dist/ci/android-miniapp-toolkit/jdk/jdk-11.0.18_osx-x64_0.1.0/release +2 -0
  73. package/dist/ci/miniapp/miniappPlugin.js +1 -1
  74. package/dist/common/code-analyse/index.js +1 -1
  75. package/dist/config/config.js +1 -1
  76. package/dist/config/define.js +1 -1
  77. package/dist/index.js +1 -1
  78. package/dist/modules/corecompiler/original/workerThread/config.js +1 -1
  79. package/dist/modules/corecompiler/original/workerThread/index.js +1 -1
  80. package/dist/modules/corecompiler/original/workerThread/workerManager.js +1 -1
  81. package/dist/modules/corecompiler/processHandler.js +1 -1
  82. package/dist/modules/corecompiler/summer/pluginDriver.js +1 -1
  83. package/dist/modules/corecompiler/summer/plugins/sass.js +1 -1
  84. package/dist/modules/corecompiler/summerCompiler.js +1 -1
  85. package/dist/modules/createSummer.js +1 -1
  86. package/dist/modules/index.js +1 -1
  87. package/dist/modules/nativecompiler/ios/buildCloud.js +1 -1
  88. package/dist/modules/nativecompiler/ios/index.js +1 -1
  89. package/dist/modules/precompiler/conditioncompile/define.js +1 -1
  90. package/dist/modules/precompiler/conditioncompile/index.js +1 -1
  91. package/dist/schema/dist/app.js +30 -1
  92. package/dist/schema/dist/ext.js +4 -1
  93. package/dist/schema/dist/game.js +1 -1
  94. package/dist/schema/dist/page.js +4 -1
  95. package/dist/schema/dist/plugin.js +1 -1
  96. package/dist/schema/dist/pluginpage.js +1 -1
  97. package/dist/schema/dist/projectconfig.js +2 -1
  98. package/dist/schema/dist/projectprivateconfig.js +1 -1
  99. package/dist/schema/dist/sitemap.js +1 -1
  100. package/dist/schema/dist/theme.js +1 -1
  101. package/dist/static/scripts/resignIpa +10 -2
  102. package/dist/utils/debug.js +1 -1
  103. package/dist/utils/miniappJson.js +1 -1
  104. package/dist/utils/packOptionsHelper.js +1 -1
  105. package/dist/utils/subprocess/processManager.js +1 -1
  106. package/dist/utils/subprocess/processService.js +1 -1
  107. package/package.json +3 -1
  108. package/dist/@types/modules/corecompiler/original/webWorker/WebWorkerInstance.d.ts +0 -1
  109. package/dist/@types/modules/corecompiler/original/webWorker/childWebWorker.d.ts +0 -1
  110. package/dist/modules/corecompiler/original/webWorker/WebWorkerInstance.js +0 -1
  111. package/dist/modules/corecompiler/original/webWorker/childWebWorker.js +0 -1
@@ -0,0 +1,1366 @@
1
+ #
2
+ # This is the "master security properties file".
3
+ #
4
+ # An alternate java.security properties file may be specified
5
+ # from the command line via the system property
6
+ #
7
+ # -Djava.security.properties=<URL>
8
+ #
9
+ # This properties file appends to the master security properties file.
10
+ # If both properties files specify values for the same key, the value
11
+ # from the command-line properties file is selected, as it is the last
12
+ # one loaded.
13
+ #
14
+ # Also, if you specify
15
+ #
16
+ # -Djava.security.properties==<URL> (2 equals),
17
+ #
18
+ # then that properties file completely overrides the master security
19
+ # properties file.
20
+ #
21
+ # To disable the ability to specify an additional properties file from
22
+ # the command line, set the key security.overridePropertiesFile
23
+ # to false in the master security properties file. It is set to true
24
+ # by default.
25
+
26
+ # In this file, various security properties are set for use by
27
+ # java.security classes. This is where users can statically register
28
+ # Cryptography Package Providers ("providers" for short). The term
29
+ # "provider" refers to a package or set of packages that supply a
30
+ # concrete implementation of a subset of the cryptography aspects of
31
+ # the Java Security API. A provider may, for example, implement one or
32
+ # more digital signature algorithms or message digest algorithms.
33
+ #
34
+ # Each provider must implement a subclass of the Provider class.
35
+ # To register a provider in this master security properties file,
36
+ # specify the provider and priority in the format
37
+ #
38
+ # security.provider.<n>=<provName | className>
39
+ #
40
+ # This declares a provider, and specifies its preference
41
+ # order n. The preference order is the order in which providers are
42
+ # searched for requested algorithms (when no specific provider is
43
+ # requested). The order is 1-based; 1 is the most preferred, followed
44
+ # by 2, and so on.
45
+ #
46
+ # <provName> must specify the name of the Provider as passed to its super
47
+ # class java.security.Provider constructor. This is for providers loaded
48
+ # through the ServiceLoader mechanism.
49
+ #
50
+ # <className> must specify the subclass of the Provider class whose
51
+ # constructor sets the values of various properties that are required
52
+ # for the Java Security API to look up the algorithms or other
53
+ # facilities implemented by the provider. This is for providers loaded
54
+ # through classpath.
55
+ #
56
+ # Note: Providers can be dynamically registered instead by calls to
57
+ # either the addProvider or insertProviderAt method in the Security
58
+ # class.
59
+
60
+ #
61
+ # List of providers and their preference orders (see above):
62
+ #
63
+ security.provider.1=SUN
64
+ security.provider.2=SunRsaSign
65
+ security.provider.3=SunEC
66
+ security.provider.4=SunJSSE
67
+ security.provider.5=SunJCE
68
+ security.provider.6=SunJGSS
69
+ security.provider.7=SunSASL
70
+ security.provider.8=XMLDSig
71
+ security.provider.9=SunPCSC
72
+ security.provider.10=JdkLDAP
73
+ security.provider.11=JdkSASL
74
+ security.provider.12=Apple
75
+ security.provider.13=SunPKCS11
76
+
77
+ #
78
+ # A list of preferred providers for specific algorithms. These providers will
79
+ # be searched for matching algorithms before the list of registered providers.
80
+ # Entries containing errors (parsing, etc) will be ignored. Use the
81
+ # -Djava.security.debug=jca property to debug these errors.
82
+ #
83
+ # The property is a comma-separated list of serviceType.algorithm:provider
84
+ # entries. The serviceType (example: "MessageDigest") is optional, and if
85
+ # not specified, the algorithm applies to all service types that support it.
86
+ # The algorithm is the standard algorithm name or transformation.
87
+ # Transformations can be specified in their full standard name
88
+ # (ex: AES/CBC/PKCS5Padding), or as partial matches (ex: AES, AES/CBC).
89
+ # The provider is the name of the provider. Any provider that does not
90
+ # also appear in the registered list will be ignored.
91
+ #
92
+ # There is a special serviceType for this property only to group a set of
93
+ # algorithms together. The type is "Group" and is followed by an algorithm
94
+ # keyword. Groups are to simplify and lessen the entries on the property
95
+ # line. Current groups are:
96
+ # Group.SHA2 = SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256
97
+ # Group.HmacSHA2 = HmacSHA224, HmacSHA256, HmacSHA384, HmacSHA512
98
+ # Group.SHA2RSA = SHA224withRSA, SHA256withRSA, SHA384withRSA, SHA512withRSA
99
+ # Group.SHA2DSA = SHA224withDSA, SHA256withDSA, SHA384withDSA, SHA512withDSA
100
+ # Group.SHA2ECDSA = SHA224withECDSA, SHA256withECDSA, SHA384withECDSA, \
101
+ # SHA512withECDSA
102
+ # Group.SHA3 = SHA3-224, SHA3-256, SHA3-384, SHA3-512
103
+ # Group.HmacSHA3 = HmacSHA3-224, HmacSHA3-256, HmacSHA3-384, HmacSHA3-512
104
+ #
105
+ # Example:
106
+ # jdk.security.provider.preferred=AES/GCM/NoPadding:SunJCE, \
107
+ # MessageDigest.SHA-256:SUN, Group.HmacSHA2:SunJCE
108
+ #
109
+ #jdk.security.provider.preferred=
110
+
111
+
112
+ #
113
+ # Sun Provider SecureRandom seed source.
114
+ #
115
+ # Select the primary source of seed data for the "NativePRNG", "SHA1PRNG"
116
+ # and "DRBG" SecureRandom implementations in the "Sun" provider.
117
+ # (Other SecureRandom implementations might also use this property.)
118
+ #
119
+ # On Unix-like systems (for example, Solaris/Linux/MacOS), the
120
+ # "NativePRNG", "SHA1PRNG" and "DRBG" implementations obtains seed data from
121
+ # special device files such as file:/dev/random.
122
+ #
123
+ # On Windows systems, specifying the URLs "file:/dev/random" or
124
+ # "file:/dev/urandom" will enable the native Microsoft CryptoAPI seeding
125
+ # mechanism for SHA1PRNG and DRBG.
126
+ #
127
+ # By default, an attempt is made to use the entropy gathering device
128
+ # specified by the "securerandom.source" Security property. If an
129
+ # exception occurs while accessing the specified URL:
130
+ #
131
+ # NativePRNG:
132
+ # a default value of /dev/random will be used. If neither
133
+ # are available, the implementation will be disabled.
134
+ # "file" is the only currently supported protocol type.
135
+ #
136
+ # SHA1PRNG and DRBG:
137
+ # the traditional system/thread activity algorithm will be used.
138
+ #
139
+ # The entropy gathering device can also be specified with the System
140
+ # property "java.security.egd". For example:
141
+ #
142
+ # % java -Djava.security.egd=file:/dev/random MainClass
143
+ #
144
+ # Specifying this System property will override the
145
+ # "securerandom.source" Security property.
146
+ #
147
+ # In addition, if "file:/dev/random" or "file:/dev/urandom" is
148
+ # specified, the "NativePRNG" implementation will be more preferred than
149
+ # DRBG and SHA1PRNG in the Sun provider.
150
+ #
151
+ securerandom.source=file:/dev/random
152
+
153
+ #
154
+ # A list of known strong SecureRandom implementations.
155
+ #
156
+ # To help guide applications in selecting a suitable strong
157
+ # java.security.SecureRandom implementation, Java distributions should
158
+ # indicate a list of known strong implementations using the property.
159
+ #
160
+ # This is a comma-separated list of algorithm and/or algorithm:provider
161
+ # entries.
162
+ #
163
+ securerandom.strongAlgorithms=NativePRNGBlocking:SUN,DRBG:SUN
164
+
165
+ #
166
+ # Sun provider DRBG configuration and default instantiation request.
167
+ #
168
+ # NIST SP 800-90Ar1 lists several DRBG mechanisms. Each can be configured
169
+ # with a DRBG algorithm name, and can be instantiated with a security strength,
170
+ # prediction resistance support, etc. This property defines the configuration
171
+ # and the default instantiation request of "DRBG" SecureRandom implementations
172
+ # in the SUN provider. (Other DRBG implementations can also use this property.)
173
+ # Applications can request different instantiation parameters like security
174
+ # strength, capability, personalization string using one of the
175
+ # getInstance(...,SecureRandomParameters,...) methods with a
176
+ # DrbgParameters.Instantiation argument, but other settings such as the
177
+ # mechanism and DRBG algorithm names are not currently configurable by any API.
178
+ #
179
+ # Please note that the SUN implementation of DRBG always supports reseeding.
180
+ #
181
+ # The value of this property is a comma-separated list of all configurable
182
+ # aspects. The aspects can appear in any order but the same aspect can only
183
+ # appear at most once. Its BNF-style definition is:
184
+ #
185
+ # Value:
186
+ # aspect { "," aspect }
187
+ #
188
+ # aspect:
189
+ # mech_name | algorithm_name | strength | capability | df
190
+ #
191
+ # // The DRBG mechanism to use. Default "Hash_DRBG"
192
+ # mech_name:
193
+ # "Hash_DRBG" | "HMAC_DRBG" | "CTR_DRBG"
194
+ #
195
+ # // The DRBG algorithm name. The "SHA-***" names are for Hash_DRBG and
196
+ # // HMAC_DRBG, default "SHA-256". The "AES-***" names are for CTR_DRBG,
197
+ # // default "AES-128" when using the limited cryptographic or "AES-256"
198
+ # // when using the unlimited.
199
+ # algorithm_name:
200
+ # "SHA-224" | "SHA-512/224" | "SHA-256" |
201
+ # "SHA-512/256" | "SHA-384" | "SHA-512" |
202
+ # "AES-128" | "AES-192" | "AES-256"
203
+ #
204
+ # // Security strength requested. Default "128"
205
+ # strength:
206
+ # "112" | "128" | "192" | "256"
207
+ #
208
+ # // Prediction resistance and reseeding request. Default "none"
209
+ # // "pr_and_reseed" - Both prediction resistance and reseeding
210
+ # // support requested
211
+ # // "reseed_only" - Only reseeding support requested
212
+ # // "none" - Neither prediction resistance not reseeding
213
+ # // support requested
214
+ # pr:
215
+ # "pr_and_reseed" | "reseed_only" | "none"
216
+ #
217
+ # // Whether a derivation function should be used. only applicable
218
+ # // to CTR_DRBG. Default "use_df"
219
+ # df:
220
+ # "use_df" | "no_df"
221
+ #
222
+ # Examples,
223
+ # securerandom.drbg.config=Hash_DRBG,SHA-224,112,none
224
+ # securerandom.drbg.config=CTR_DRBG,AES-256,192,pr_and_reseed,use_df
225
+ #
226
+ # The default value is an empty string, which is equivalent to
227
+ # securerandom.drbg.config=Hash_DRBG,SHA-256,128,none
228
+ #
229
+ securerandom.drbg.config=
230
+
231
+ #
232
+ # Class to instantiate as the javax.security.auth.login.Configuration
233
+ # provider.
234
+ #
235
+ login.configuration.provider=sun.security.provider.ConfigFile
236
+
237
+ #
238
+ # Default login configuration file
239
+ #
240
+ #login.config.url.1=file:${user.home}/.java.login.config
241
+
242
+ #
243
+ # Class to instantiate as the system Policy. This is the name of the class
244
+ # that will be used as the Policy object. The system class loader is used to
245
+ # locate this class.
246
+ #
247
+ policy.provider=sun.security.provider.PolicyFile
248
+
249
+ # The default is to have a single system-wide policy file,
250
+ # and a policy file in the user's home directory.
251
+ #
252
+ policy.url.1=file:${java.home}/conf/security/java.policy
253
+ policy.url.2=file:${user.home}/.java.policy
254
+
255
+ # whether or not we expand properties in the policy file
256
+ # if this is set to false, properties (${...}) will not be expanded in policy
257
+ # files.
258
+ #
259
+ policy.expandProperties=true
260
+
261
+ # whether or not we allow an extra policy to be passed on the command line
262
+ # with -Djava.security.policy=somefile. Comment out this line to disable
263
+ # this feature.
264
+ #
265
+ policy.allowSystemProperty=true
266
+
267
+ # whether or not we look into the IdentityScope for trusted Identities
268
+ # when encountering a 1.1 signed JAR file. If the identity is found
269
+ # and is trusted, we grant it AllPermission. Note: the default policy
270
+ # provider (sun.security.provider.PolicyFile) does not support this property.
271
+ #
272
+ policy.ignoreIdentityScope=false
273
+
274
+ #
275
+ # Default keystore type.
276
+ #
277
+ keystore.type=pkcs12
278
+
279
+ #
280
+ # Controls compatibility mode for JKS and PKCS12 keystore types.
281
+ #
282
+ # When set to 'true', both JKS and PKCS12 keystore types support loading
283
+ # keystore files in either JKS or PKCS12 format. When set to 'false' the
284
+ # JKS keystore type supports loading only JKS keystore files and the PKCS12
285
+ # keystore type supports loading only PKCS12 keystore files.
286
+ #
287
+ keystore.type.compat=true
288
+
289
+ #
290
+ # List of comma-separated packages that start with or equal this string
291
+ # will cause a security exception to be thrown when passed to the
292
+ # SecurityManager::checkPackageAccess method unless the corresponding
293
+ # RuntimePermission("accessClassInPackage."+package) has been granted.
294
+ #
295
+ package.access=sun.misc.,\
296
+ sun.reflect.
297
+
298
+ #
299
+ # List of comma-separated packages that start with or equal this string
300
+ # will cause a security exception to be thrown when passed to the
301
+ # SecurityManager::checkPackageDefinition method unless the corresponding
302
+ # RuntimePermission("defineClassInPackage."+package) has been granted.
303
+ #
304
+ # By default, none of the class loaders supplied with the JDK call
305
+ # checkPackageDefinition.
306
+ #
307
+ package.definition=sun.misc.,\
308
+ sun.reflect.
309
+
310
+ #
311
+ # Determines whether this properties file can be appended to
312
+ # or overridden on the command line via -Djava.security.properties
313
+ #
314
+ security.overridePropertiesFile=true
315
+
316
+ #
317
+ # Determines the default key and trust manager factory algorithms for
318
+ # the javax.net.ssl package.
319
+ #
320
+ ssl.KeyManagerFactory.algorithm=SunX509
321
+ ssl.TrustManagerFactory.algorithm=PKIX
322
+
323
+ #
324
+ # The Java-level namelookup cache policy for successful lookups:
325
+ #
326
+ # any negative value: caching forever
327
+ # any positive value: the number of seconds to cache an address for
328
+ # zero: do not cache
329
+ #
330
+ # default value is forever (FOREVER). For security reasons, this
331
+ # caching is made forever when a security manager is set. When a security
332
+ # manager is not set, the default behavior in this implementation
333
+ # is to cache for 30 seconds.
334
+ #
335
+ # NOTE: setting this to anything other than the default value can have
336
+ # serious security implications. Do not set it unless
337
+ # you are sure you are not exposed to DNS spoofing attack.
338
+ #
339
+ #networkaddress.cache.ttl=-1
340
+
341
+ # The Java-level namelookup cache policy for failed lookups:
342
+ #
343
+ # any negative value: cache forever
344
+ # any positive value: the number of seconds to cache negative lookup results
345
+ # zero: do not cache
346
+ #
347
+ # In some Microsoft Windows networking environments that employ
348
+ # the WINS name service in addition to DNS, name service lookups
349
+ # that fail may take a noticeably long time to return (approx. 5 seconds).
350
+ # For this reason the default caching policy is to maintain these
351
+ # results for 10 seconds.
352
+ #
353
+ networkaddress.cache.negative.ttl=10
354
+
355
+ #
356
+ # Properties to configure OCSP for certificate revocation checking
357
+ #
358
+
359
+ # Enable OCSP
360
+ #
361
+ # By default, OCSP is not used for certificate revocation checking.
362
+ # This property enables the use of OCSP when set to the value "true".
363
+ #
364
+ # NOTE: SocketPermission is required to connect to an OCSP responder.
365
+ #
366
+ # Example,
367
+ # ocsp.enable=true
368
+
369
+ #
370
+ # Location of the OCSP responder
371
+ #
372
+ # By default, the location of the OCSP responder is determined implicitly
373
+ # from the certificate being validated. This property explicitly specifies
374
+ # the location of the OCSP responder. The property is used when the
375
+ # Authority Information Access extension (defined in RFC 5280) is absent
376
+ # from the certificate or when it requires overriding.
377
+ #
378
+ # Example,
379
+ # ocsp.responderURL=http://ocsp.example.net:80
380
+
381
+ #
382
+ # Subject name of the OCSP responder's certificate
383
+ #
384
+ # By default, the certificate of the OCSP responder is that of the issuer
385
+ # of the certificate being validated. This property identifies the certificate
386
+ # of the OCSP responder when the default does not apply. Its value is a string
387
+ # distinguished name (defined in RFC 2253) which identifies a certificate in
388
+ # the set of certificates supplied during cert path validation. In cases where
389
+ # the subject name alone is not sufficient to uniquely identify the certificate
390
+ # then both the "ocsp.responderCertIssuerName" and
391
+ # "ocsp.responderCertSerialNumber" properties must be used instead. When this
392
+ # property is set then those two properties are ignored.
393
+ #
394
+ # Example,
395
+ # ocsp.responderCertSubjectName=CN=OCSP Responder, O=XYZ Corp
396
+
397
+ #
398
+ # Issuer name of the OCSP responder's certificate
399
+ #
400
+ # By default, the certificate of the OCSP responder is that of the issuer
401
+ # of the certificate being validated. This property identifies the certificate
402
+ # of the OCSP responder when the default does not apply. Its value is a string
403
+ # distinguished name (defined in RFC 2253) which identifies a certificate in
404
+ # the set of certificates supplied during cert path validation. When this
405
+ # property is set then the "ocsp.responderCertSerialNumber" property must also
406
+ # be set. When the "ocsp.responderCertSubjectName" property is set then this
407
+ # property is ignored.
408
+ #
409
+ # Example,
410
+ # ocsp.responderCertIssuerName=CN=Enterprise CA, O=XYZ Corp
411
+
412
+ #
413
+ # Serial number of the OCSP responder's certificate
414
+ #
415
+ # By default, the certificate of the OCSP responder is that of the issuer
416
+ # of the certificate being validated. This property identifies the certificate
417
+ # of the OCSP responder when the default does not apply. Its value is a string
418
+ # of hexadecimal digits (colon or space separators may be present) which
419
+ # identifies a certificate in the set of certificates supplied during cert path
420
+ # validation. When this property is set then the "ocsp.responderCertIssuerName"
421
+ # property must also be set. When the "ocsp.responderCertSubjectName" property
422
+ # is set then this property is ignored.
423
+ #
424
+ # Example,
425
+ # ocsp.responderCertSerialNumber=2A:FF:00
426
+
427
+ #
428
+ # Policy for failed Kerberos KDC lookups:
429
+ #
430
+ # When a KDC is unavailable (network error, service failure, etc), it is
431
+ # put inside a secondary list and accessed less often for future requests. The
432
+ # value (case-insensitive) for this policy can be:
433
+ #
434
+ # tryLast
435
+ # KDCs in the secondary list are always tried after those not on the list.
436
+ #
437
+ # tryLess[:max_retries,timeout]
438
+ # KDCs in the secondary list are still tried by their order in the
439
+ # configuration, but with smaller max_retries and timeout values.
440
+ # max_retries and timeout are optional numerical parameters (default 1 and
441
+ # 5000, which means once and 5 seconds). Please note that if any of the
442
+ # values defined here are more than what is defined in krb5.conf, it will be
443
+ # ignored.
444
+ #
445
+ # Whenever a KDC is detected as available, it is removed from the secondary
446
+ # list. The secondary list is reset when krb5.conf is reloaded. You can add
447
+ # refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is
448
+ # reloaded whenever a JAAS authentication is attempted.
449
+ #
450
+ # Example,
451
+ # krb5.kdc.bad.policy = tryLast
452
+ # krb5.kdc.bad.policy = tryLess:2,2000
453
+ #
454
+ krb5.kdc.bad.policy = tryLast
455
+
456
+ #
457
+ # Kerberos cross-realm referrals (RFC 6806)
458
+ #
459
+ # OpenJDK's Kerberos client supports cross-realm referrals as defined in
460
+ # RFC 6806. This allows to setup more dynamic environments in which clients
461
+ # do not need to know in advance how to reach the realm of a target principal
462
+ # (either a user or service).
463
+ #
464
+ # When a client issues an AS or a TGS request, the "canonicalize" option
465
+ # is set to announce support of this feature. A KDC server may fulfill the
466
+ # request or reply referring the client to a different one. If referred,
467
+ # the client will issue a new request and the cycle repeats.
468
+ #
469
+ # In addition to referrals, the "canonicalize" option allows the KDC server
470
+ # to change the client name in response to an AS request. For security reasons,
471
+ # RFC 6806 (section 11) FAST scheme is enforced.
472
+ #
473
+ # Disable Kerberos cross-realm referrals. Value may be overwritten with a
474
+ # System property (-Dsun.security.krb5.disableReferrals).
475
+ sun.security.krb5.disableReferrals=false
476
+
477
+ # Maximum number of AS or TGS referrals to avoid infinite loops. Value may
478
+ # be overwritten with a System property (-Dsun.security.krb5.maxReferrals).
479
+ sun.security.krb5.maxReferrals=5
480
+
481
+ #
482
+ # This property contains a list of disabled EC Named Curves that can be included
483
+ # in the jdk.[tls|certpath|jar].disabledAlgorithms properties. To include this
484
+ # list in any of the disabledAlgorithms properties, add the property name as
485
+ # an entry.
486
+ jdk.disabled.namedCurves = secp112r1, secp112r2, secp128r1, secp128r2, \
487
+ secp160k1, secp160r1, secp160r2, secp192k1, secp192r1, secp224k1, \
488
+ secp224r1, secp256k1, sect113r1, sect113r2, sect131r1, sect131r2, \
489
+ sect163k1, sect163r1, sect163r2, sect193r1, sect193r2, sect233k1, \
490
+ sect233r1, sect239k1, sect283k1, sect283r1, sect409k1, sect409r1, \
491
+ sect571k1, sect571r1, X9.62 c2tnb191v1, X9.62 c2tnb191v2, \
492
+ X9.62 c2tnb191v3, X9.62 c2tnb239v1, X9.62 c2tnb239v2, X9.62 c2tnb239v3, \
493
+ X9.62 c2tnb359v1, X9.62 c2tnb431r1, X9.62 prime192v2, X9.62 prime192v3, \
494
+ X9.62 prime239v1, X9.62 prime239v2, X9.62 prime239v3, brainpoolP256r1, \
495
+ brainpoolP320r1, brainpoolP384r1, brainpoolP512r1
496
+
497
+ #
498
+ # Algorithm restrictions for certification path (CertPath) processing
499
+ #
500
+ # In some environments, certain algorithms or key lengths may be undesirable
501
+ # for certification path building and validation. For example, "MD2" is
502
+ # generally no longer considered to be a secure hash algorithm. This section
503
+ # describes the mechanism for disabling algorithms based on algorithm name
504
+ # and/or key length. This includes algorithms used in certificates, as well
505
+ # as revocation information such as CRLs and signed OCSP Responses.
506
+ # The syntax of the disabled algorithm string is described as follows:
507
+ # DisabledAlgorithms:
508
+ # " DisabledAlgorithm { , DisabledAlgorithm } "
509
+ #
510
+ # DisabledAlgorithm:
511
+ # AlgorithmName [Constraint] { '&' Constraint } | IncludeProperty
512
+ #
513
+ # AlgorithmName:
514
+ # (see below)
515
+ #
516
+ # Constraint:
517
+ # KeySizeConstraint | CAConstraint | DenyAfterConstraint |
518
+ # UsageConstraint
519
+ #
520
+ # KeySizeConstraint:
521
+ # keySize Operator KeyLength
522
+ #
523
+ # Operator:
524
+ # <= | < | == | != | >= | >
525
+ #
526
+ # KeyLength:
527
+ # Integer value of the algorithm's key length in bits
528
+ #
529
+ # CAConstraint:
530
+ # jdkCA
531
+ #
532
+ # DenyAfterConstraint:
533
+ # denyAfter YYYY-MM-DD
534
+ #
535
+ # UsageConstraint:
536
+ # usage [TLSServer] [TLSClient] [SignedJAR]
537
+ #
538
+ # IncludeProperty:
539
+ # include <security property>
540
+ #
541
+ # The "AlgorithmName" is the standard algorithm name of the disabled
542
+ # algorithm. See the Java Security Standard Algorithm Names Specification
543
+ # for information about Standard Algorithm Names. Matching is
544
+ # performed using a case-insensitive sub-element matching rule. (For
545
+ # example, in "SHA1withECDSA" the sub-elements are "SHA1" for hashing and
546
+ # "ECDSA" for signatures.) If the assertion "AlgorithmName" is a
547
+ # sub-element of the certificate algorithm name, the algorithm will be
548
+ # rejected during certification path building and validation. For example,
549
+ # the assertion algorithm name "DSA" will disable all certificate algorithms
550
+ # that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion
551
+ # will not disable algorithms related to "ECDSA".
552
+ #
553
+ # The "IncludeProperty" allows a implementation-defined security property that
554
+ # can be included in the disabledAlgorithms properties. These properties are
555
+ # to help manage common actions easier across multiple disabledAlgorithm
556
+ # properties.
557
+ # There is one defined security property: jdk.disabled.namedCurves
558
+ # See the property for more specific details.
559
+ #
560
+ #
561
+ # A "Constraint" defines restrictions on the keys and/or certificates for
562
+ # a specified AlgorithmName:
563
+ #
564
+ # KeySizeConstraint:
565
+ # keySize Operator KeyLength
566
+ # The constraint requires a key of a valid size range if the
567
+ # "AlgorithmName" is of a key algorithm. The "KeyLength" indicates
568
+ # the key size specified in number of bits. For example,
569
+ # "RSA keySize <= 1024" indicates that any RSA key with key size less
570
+ # than or equal to 1024 bits should be disabled, and
571
+ # "RSA keySize < 1024, RSA keySize > 2048" indicates that any RSA key
572
+ # with key size less than 1024 or greater than 2048 should be disabled.
573
+ # This constraint is only used on algorithms that have a key size.
574
+ #
575
+ # CAConstraint:
576
+ # jdkCA
577
+ # This constraint prohibits the specified algorithm only if the
578
+ # algorithm is used in a certificate chain that terminates at a marked
579
+ # trust anchor in the lib/security/cacerts keystore. If the jdkCA
580
+ # constraint is not set, then all chains using the specified algorithm
581
+ # are restricted. jdkCA may only be used once in a DisabledAlgorithm
582
+ # expression.
583
+ # Example: To apply this constraint to SHA-1 certificates, include
584
+ # the following: "SHA1 jdkCA"
585
+ #
586
+ # DenyAfterConstraint:
587
+ # denyAfter YYYY-MM-DD
588
+ # This constraint prohibits a certificate with the specified algorithm
589
+ # from being used after the date regardless of the certificate's
590
+ # validity. JAR files that are signed and timestamped before the
591
+ # constraint date with certificates containing the disabled algorithm
592
+ # will not be restricted. The date is processed in the UTC timezone.
593
+ # This constraint can only be used once in a DisabledAlgorithm
594
+ # expression.
595
+ # Example: To deny usage of RSA 2048 bit certificates after Feb 3 2020,
596
+ # use the following: "RSA keySize == 2048 & denyAfter 2020-02-03"
597
+ #
598
+ # UsageConstraint:
599
+ # usage [TLSServer] [TLSClient] [SignedJAR]
600
+ # This constraint prohibits the specified algorithm for
601
+ # a specified usage. This should be used when disabling an algorithm
602
+ # for all usages is not practical. 'TLSServer' restricts the algorithm
603
+ # in TLS server certificate chains when server authentication is
604
+ # performed. 'TLSClient' restricts the algorithm in TLS client
605
+ # certificate chains when client authentication is performed.
606
+ # 'SignedJAR' constrains use of certificates in signed jar files.
607
+ # The usage type follows the keyword and more than one usage type can
608
+ # be specified with a whitespace delimiter.
609
+ # Example: "SHA1 usage TLSServer TLSClient"
610
+ #
611
+ # When an algorithm must satisfy more than one constraint, it must be
612
+ # delimited by an ampersand '&'. For example, to restrict certificates in a
613
+ # chain that terminate at a distribution provided trust anchor and contain
614
+ # RSA keys that are less than or equal to 1024 bits, add the following
615
+ # constraint: "RSA keySize <= 1024 & jdkCA".
616
+ #
617
+ # All DisabledAlgorithms expressions are processed in the order defined in the
618
+ # property. This requires lower keysize constraints to be specified
619
+ # before larger keysize constraints of the same algorithm. For example:
620
+ # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048".
621
+ #
622
+ # Note: The algorithm restrictions do not apply to trust anchors or
623
+ # self-signed certificates.
624
+ #
625
+ # Note: This property is currently used by Oracle's PKIX implementation. It
626
+ # is not guaranteed to be examined and used by other implementations.
627
+ #
628
+ # Example:
629
+ # jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
630
+ #
631
+ #
632
+ jdk.certpath.disabledAlgorithms=MD2, MD5, SHA1 jdkCA & usage TLSServer, \
633
+ RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, \
634
+ SHA1 usage SignedJAR & denyAfter 2019-01-01, \
635
+ include jdk.disabled.namedCurves
636
+
637
+ #
638
+ # Legacy algorithms for certification path (CertPath) processing and
639
+ # signed JAR files.
640
+ #
641
+ # In some environments, a certain algorithm or key length may be undesirable
642
+ # but is not yet disabled.
643
+ #
644
+ # Tools such as keytool and jarsigner may emit warnings when these legacy
645
+ # algorithms are used. See the man pages for those tools for more information.
646
+ #
647
+ # The syntax is the same as the "jdk.certpath.disabledAlgorithms" and
648
+ # "jdk.jar.disabledAlgorithms" security properties.
649
+ #
650
+ # Note: This property is currently used by the JDK Reference
651
+ # implementation. It is not guaranteed to be examined and used by other
652
+ # implementations.
653
+
654
+ jdk.security.legacyAlgorithms=SHA1, \
655
+ RSA keySize < 2048, DSA keySize < 2048
656
+
657
+ #
658
+ # Algorithm restrictions for signed JAR files
659
+ #
660
+ # In some environments, certain algorithms or key lengths may be undesirable
661
+ # for signed JAR validation. For example, "MD2" is generally no longer
662
+ # considered to be a secure hash algorithm. This section describes the
663
+ # mechanism for disabling algorithms based on algorithm name and/or key length.
664
+ # JARs signed with any of the disabled algorithms or key sizes will be treated
665
+ # as unsigned.
666
+ #
667
+ # The syntax of the disabled algorithm string is described as follows:
668
+ # DisabledAlgorithms:
669
+ # " DisabledAlgorithm { , DisabledAlgorithm } "
670
+ #
671
+ # DisabledAlgorithm:
672
+ # AlgorithmName [Constraint] { '&' Constraint }
673
+ #
674
+ # AlgorithmName:
675
+ # (see below)
676
+ #
677
+ # Constraint:
678
+ # KeySizeConstraint | DenyAfterConstraint
679
+ #
680
+ # KeySizeConstraint:
681
+ # keySize Operator KeyLength
682
+ #
683
+ # DenyAfterConstraint:
684
+ # denyAfter YYYY-MM-DD
685
+ #
686
+ # Operator:
687
+ # <= | < | == | != | >= | >
688
+ #
689
+ # KeyLength:
690
+ # Integer value of the algorithm's key length in bits
691
+ #
692
+ # Note: This property is currently used by the JDK Reference
693
+ # implementation. It is not guaranteed to be examined and used by other
694
+ # implementations.
695
+ #
696
+ # See "jdk.certpath.disabledAlgorithms" for syntax descriptions.
697
+ #
698
+ jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, \
699
+ DSA keySize < 1024, SHA1 denyAfter 2019-01-01, \
700
+ include jdk.disabled.namedCurves
701
+
702
+ #
703
+ # Algorithm restrictions for Secure Socket Layer/Transport Layer Security
704
+ # (SSL/TLS/DTLS) processing
705
+ #
706
+ # In some environments, certain algorithms or key lengths may be undesirable
707
+ # when using SSL/TLS/DTLS. This section describes the mechanism for disabling
708
+ # algorithms during SSL/TLS/DTLS security parameters negotiation, including
709
+ # protocol version negotiation, cipher suites selection, named groups
710
+ # selection, signature schemes selection, peer authentication and key
711
+ # exchange mechanisms.
712
+ #
713
+ # Disabled algorithms will not be negotiated for SSL/TLS connections, even
714
+ # if they are enabled explicitly in an application.
715
+ #
716
+ # For PKI-based peer authentication and key exchange mechanisms, this list
717
+ # of disabled algorithms will also be checked during certification path
718
+ # building and validation, including algorithms used in certificates, as
719
+ # well as revocation information such as CRLs and signed OCSP Responses.
720
+ # This is in addition to the jdk.certpath.disabledAlgorithms property above.
721
+ #
722
+ # See the specification of "jdk.certpath.disabledAlgorithms" for the
723
+ # syntax of the disabled algorithm string.
724
+ #
725
+ # Note: The algorithm restrictions do not apply to trust anchors or
726
+ # self-signed certificates.
727
+ #
728
+ # Note: This property is currently used by the JDK Reference implementation.
729
+ # It is not guaranteed to be examined and used by other implementations.
730
+ #
731
+ # Example:
732
+ # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048, \
733
+ # rsa_pkcs1_sha1, secp224r1
734
+ jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, RC4, DES, MD5withRSA, \
735
+ DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \
736
+ include jdk.disabled.namedCurves
737
+
738
+ #
739
+ # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
740
+ # processing in JSSE implementation.
741
+ #
742
+ # In some environments, a certain algorithm may be undesirable but it
743
+ # cannot be disabled because of its use in legacy applications. Legacy
744
+ # algorithms may still be supported, but applications should not use them
745
+ # as the security strength of legacy algorithms are usually not strong enough
746
+ # in practice.
747
+ #
748
+ # During SSL/TLS security parameters negotiation, legacy algorithms will
749
+ # not be negotiated unless there are no other candidates.
750
+ #
751
+ # The syntax of the legacy algorithms string is described as this Java
752
+ # BNF-style:
753
+ # LegacyAlgorithms:
754
+ # " LegacyAlgorithm { , LegacyAlgorithm } "
755
+ #
756
+ # LegacyAlgorithm:
757
+ # AlgorithmName (standard JSSE algorithm name)
758
+ #
759
+ # See the specification of security property "jdk.certpath.disabledAlgorithms"
760
+ # for the syntax and description of the "AlgorithmName" notation.
761
+ #
762
+ # Per SSL/TLS specifications, cipher suites have the form:
763
+ # SSL_KeyExchangeAlg_WITH_CipherAlg_MacAlg
764
+ # or
765
+ # TLS_KeyExchangeAlg_WITH_CipherAlg_MacAlg
766
+ #
767
+ # For example, the cipher suite TLS_RSA_WITH_AES_128_CBC_SHA uses RSA as the
768
+ # key exchange algorithm, AES_128_CBC (128 bits AES cipher algorithm in CBC
769
+ # mode) as the cipher (encryption) algorithm, and SHA-1 as the message digest
770
+ # algorithm for HMAC.
771
+ #
772
+ # The LegacyAlgorithm can be one of the following standard algorithm names:
773
+ # 1. JSSE cipher suite name, e.g., TLS_RSA_WITH_AES_128_CBC_SHA
774
+ # 2. JSSE key exchange algorithm name, e.g., RSA
775
+ # 3. JSSE cipher (encryption) algorithm name, e.g., AES_128_CBC
776
+ # 4. JSSE message digest algorithm name, e.g., SHA
777
+ #
778
+ # See SSL/TLS specifications and the Java Security Standard Algorithm Names
779
+ # Specification for information about the algorithm names.
780
+ #
781
+ # Note: If a legacy algorithm is also restricted through the
782
+ # jdk.tls.disabledAlgorithms property or the
783
+ # java.security.AlgorithmConstraints API (See
784
+ # javax.net.ssl.SSLParameters.setAlgorithmConstraints()),
785
+ # then the algorithm is completely disabled and will not be negotiated.
786
+ #
787
+ # Note: This property is currently used by the JDK Reference implementation.
788
+ # It is not guaranteed to be examined and used by other implementations.
789
+ # There is no guarantee the property will continue to exist or be of the
790
+ # same syntax in future releases.
791
+ #
792
+ # Example:
793
+ # jdk.tls.legacyAlgorithms=DH_anon, DES_CBC, SSL_RSA_WITH_RC4_128_MD5
794
+ #
795
+ jdk.tls.legacyAlgorithms= \
796
+ K_NULL, C_NULL, M_NULL, \
797
+ DH_anon, ECDH_anon, \
798
+ RC4_128, RC4_40, DES_CBC, DES40_CBC, \
799
+ 3DES_EDE_CBC
800
+
801
+ #
802
+ # The pre-defined default finite field Diffie-Hellman ephemeral (DHE)
803
+ # parameters for Transport Layer Security (SSL/TLS/DTLS) processing.
804
+ #
805
+ # In traditional SSL/TLS/DTLS connections where finite field DHE parameters
806
+ # negotiation mechanism is not used, the server offers the client group
807
+ # parameters, base generator g and prime modulus p, for DHE key exchange.
808
+ # It is recommended to use dynamic group parameters. This property defines
809
+ # a mechanism that allows you to specify custom group parameters.
810
+ #
811
+ # The syntax of this property string is described as this Java BNF-style:
812
+ # DefaultDHEParameters:
813
+ # DefinedDHEParameters { , DefinedDHEParameters }
814
+ #
815
+ # DefinedDHEParameters:
816
+ # "{" DHEPrimeModulus , DHEBaseGenerator "}"
817
+ #
818
+ # DHEPrimeModulus:
819
+ # HexadecimalDigits
820
+ #
821
+ # DHEBaseGenerator:
822
+ # HexadecimalDigits
823
+ #
824
+ # HexadecimalDigits:
825
+ # HexadecimalDigit { HexadecimalDigit }
826
+ #
827
+ # HexadecimalDigit: one of
828
+ # 0 1 2 3 4 5 6 7 8 9 A B C D E F a b c d e f
829
+ #
830
+ # Whitespace characters are ignored.
831
+ #
832
+ # The "DefinedDHEParameters" defines the custom group parameters, prime
833
+ # modulus p and base generator g, for a particular size of prime modulus p.
834
+ # The "DHEPrimeModulus" defines the hexadecimal prime modulus p, and the
835
+ # "DHEBaseGenerator" defines the hexadecimal base generator g of a group
836
+ # parameter. It is recommended to use safe primes for the custom group
837
+ # parameters.
838
+ #
839
+ # If this property is not defined or the value is empty, the underlying JSSE
840
+ # provider's default group parameter is used for each connection.
841
+ #
842
+ # If the property value does not follow the grammar, or a particular group
843
+ # parameter is not valid, the connection will fall back and use the
844
+ # underlying JSSE provider's default group parameter.
845
+ #
846
+ # Note: This property is currently used by OpenJDK's JSSE implementation. It
847
+ # is not guaranteed to be examined and used by other implementations.
848
+ #
849
+ # Example:
850
+ # jdk.tls.server.defaultDHEParameters=
851
+ # { \
852
+ # FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 \
853
+ # 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD \
854
+ # EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 \
855
+ # E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED \
856
+ # EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 \
857
+ # FFFFFFFF FFFFFFFF, 2}
858
+
859
+ #
860
+ # TLS key limits on symmetric cryptographic algorithms
861
+ #
862
+ # This security property sets limits on algorithms key usage in TLS 1.3.
863
+ # When the amount of data encrypted exceeds the algorithm value listed below,
864
+ # a KeyUpdate message will trigger a key change. This is for symmetric ciphers
865
+ # with TLS 1.3 only.
866
+ #
867
+ # The syntax for the property is described below:
868
+ # KeyLimits:
869
+ # " KeyLimit { , KeyLimit } "
870
+ #
871
+ # WeakKeyLimit:
872
+ # AlgorithmName Action Length
873
+ #
874
+ # AlgorithmName:
875
+ # A full algorithm transformation.
876
+ #
877
+ # Action:
878
+ # KeyUpdate
879
+ #
880
+ # Length:
881
+ # The amount of encrypted data in a session before the Action occurs
882
+ # This value may be an integer value in bytes, or as a power of two, 2^29.
883
+ #
884
+ # KeyUpdate:
885
+ # The TLS 1.3 KeyUpdate handshake process begins when the Length amount
886
+ # is fulfilled.
887
+ #
888
+ # Note: This property is currently used by OpenJDK's JSSE implementation. It
889
+ # is not guaranteed to be examined and used by other implementations.
890
+ #
891
+ jdk.tls.keyLimits=AES/GCM/NoPadding KeyUpdate 2^37
892
+
893
+ #
894
+ # Cryptographic Jurisdiction Policy defaults
895
+ #
896
+ # Import and export control rules on cryptographic software vary from
897
+ # country to country. By default, Java provides two different sets of
898
+ # cryptographic policy files[1]:
899
+ #
900
+ # unlimited: These policy files contain no restrictions on cryptographic
901
+ # strengths or algorithms
902
+ #
903
+ # limited: These policy files contain more restricted cryptographic
904
+ # strengths
905
+ #
906
+ # The default setting is determined by the value of the "crypto.policy"
907
+ # Security property below. If your country or usage requires the
908
+ # traditional restrictive policy, the "limited" Java cryptographic
909
+ # policy is still available and may be appropriate for your environment.
910
+ #
911
+ # If you have restrictions that do not fit either use case mentioned
912
+ # above, Java provides the capability to customize these policy files.
913
+ # The "crypto.policy" security property points to a subdirectory
914
+ # within <java-home>/conf/security/policy/ which can be customized.
915
+ # Please see the <java-home>/conf/security/policy/README.txt file or consult
916
+ # the Java Security Guide/JCA documentation for more information.
917
+ #
918
+ # YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
919
+ # TO DETERMINE THE EXACT REQUIREMENTS.
920
+ #
921
+ # [1] Please note that the JCE for Java SE, including the JCE framework,
922
+ # cryptographic policy files, and standard JCE providers provided with
923
+ # the Java SE, have been reviewed and approved for export as mass market
924
+ # encryption item by the US Bureau of Industry and Security.
925
+ #
926
+ # Note: This property is currently used by the JDK Reference implementation.
927
+ # It is not guaranteed to be examined and used by other implementations.
928
+ #
929
+ crypto.policy=unlimited
930
+
931
+ #
932
+ # The policy for the XML Signature secure validation mode. The mode is
933
+ # enabled by setting the property "org.jcp.xml.dsig.secureValidation" to
934
+ # true with the javax.xml.crypto.XMLCryptoContext.setProperty() method,
935
+ # or by running the code with a SecurityManager.
936
+ #
937
+ # Policy:
938
+ # Constraint {"," Constraint }
939
+ # Constraint:
940
+ # AlgConstraint | MaxTransformsConstraint | MaxReferencesConstraint |
941
+ # ReferenceUriSchemeConstraint | KeySizeConstraint | OtherConstraint
942
+ # AlgConstraint
943
+ # "disallowAlg" Uri
944
+ # MaxTransformsConstraint:
945
+ # "maxTransforms" Integer
946
+ # MaxReferencesConstraint:
947
+ # "maxReferences" Integer
948
+ # ReferenceUriSchemeConstraint:
949
+ # "disallowReferenceUriSchemes" String { String }
950
+ # KeySizeConstraint:
951
+ # "minKeySize" KeyAlg Integer
952
+ # OtherConstraint:
953
+ # "noDuplicateIds" | "noRetrievalMethodLoops"
954
+ #
955
+ # For AlgConstraint, Uri is the algorithm URI String that is not allowed.
956
+ # See the XML Signature Recommendation for more information on algorithm
957
+ # URI Identifiers. For KeySizeConstraint, KeyAlg is the standard algorithm
958
+ # name of the key type (ex: "RSA"). If the MaxTransformsConstraint,
959
+ # MaxReferencesConstraint or KeySizeConstraint (for the same key type) is
960
+ # specified more than once, only the last entry is enforced.
961
+ #
962
+ # Note: This property is currently used by the JDK Reference implementation. It
963
+ # is not guaranteed to be examined and used by other implementations.
964
+ #
965
+ jdk.xml.dsig.secureValidationPolicy=\
966
+ disallowAlg http://www.w3.org/TR/1999/REC-xslt-19991116,\
967
+ disallowAlg http://www.w3.org/2001/04/xmldsig-more#rsa-md5,\
968
+ disallowAlg http://www.w3.org/2001/04/xmldsig-more#hmac-md5,\
969
+ disallowAlg http://www.w3.org/2001/04/xmldsig-more#md5,\
970
+ maxTransforms 5,\
971
+ maxReferences 30,\
972
+ disallowReferenceUriSchemes file http https,\
973
+ minKeySize RSA 1024,\
974
+ minKeySize DSA 1024,\
975
+ minKeySize EC 224,\
976
+ noDuplicateIds,\
977
+ noRetrievalMethodLoops
978
+
979
+ #
980
+ # Serialization process-wide filter
981
+ #
982
+ # A filter, if configured, is used by java.io.ObjectInputStream during
983
+ # deserialization to check the contents of the stream.
984
+ # A filter is configured as a sequence of patterns, each pattern is either
985
+ # matched against the name of a class in the stream or defines a limit.
986
+ # Patterns are separated by ";" (semicolon).
987
+ # Whitespace is significant and is considered part of the pattern.
988
+ #
989
+ # If the system property jdk.serialFilter is also specified on the command
990
+ # line, it supersedes the security property value defined here.
991
+ #
992
+ # If a pattern includes a "=", it sets a limit.
993
+ # If a limit appears more than once the last value is used.
994
+ # Limits are checked before classes regardless of the order in the
995
+ # sequence of patterns.
996
+ # If any of the limits are exceeded, the filter status is REJECTED.
997
+ #
998
+ # maxdepth=value - the maximum depth of a graph
999
+ # maxrefs=value - the maximum number of internal references
1000
+ # maxbytes=value - the maximum number of bytes in the input stream
1001
+ # maxarray=value - the maximum array length allowed
1002
+ #
1003
+ # Other patterns, from left to right, match the class or package name as
1004
+ # returned from Class.getName.
1005
+ # If the class is an array type, the class or package to be matched is the
1006
+ # element type.
1007
+ # Arrays of any number of dimensions are treated the same as the element type.
1008
+ # For example, a pattern of "!example.Foo", rejects creation of any instance or
1009
+ # array of example.Foo.
1010
+ #
1011
+ # If the pattern starts with "!", the status is REJECTED if the remaining
1012
+ # pattern is matched; otherwise the status is ALLOWED if the pattern matches.
1013
+ # If the pattern contains "/", the non-empty prefix up to the "/" is the
1014
+ # module name;
1015
+ # if the module name matches the module name of the class then
1016
+ # the remaining pattern is matched with the class name.
1017
+ # If there is no "/", the module name is not compared.
1018
+ # If the pattern ends with ".**" it matches any class in the package and all
1019
+ # subpackages.
1020
+ # If the pattern ends with ".*" it matches any class in the package.
1021
+ # If the pattern ends with "*", it matches any class with the pattern as a
1022
+ # prefix.
1023
+ # If the pattern is equal to the class name, it matches.
1024
+ # Otherwise, the status is UNDECIDED.
1025
+ #
1026
+ #jdk.serialFilter=pattern;pattern
1027
+
1028
+ #
1029
+ # RMI Registry Serial Filter
1030
+ #
1031
+ # The filter pattern uses the same format as jdk.serialFilter.
1032
+ # This filter can override the builtin filter if additional types need to be
1033
+ # allowed or rejected from the RMI Registry or to decrease limits but not
1034
+ # to increase limits.
1035
+ # If the limits (maxdepth, maxrefs, or maxbytes) are exceeded, the object is rejected.
1036
+ #
1037
+ # Each non-array type is allowed or rejected if it matches one of the patterns,
1038
+ # evaluated from left to right, and is otherwise allowed. Arrays of any
1039
+ # component type, including subarrays and arrays of primitives, are allowed.
1040
+ #
1041
+ # Array construction of any component type, including subarrays and arrays of
1042
+ # primitives, are allowed unless the length is greater than the maxarray limit.
1043
+ # The filter is applied to each array element.
1044
+ #
1045
+ # Note: This property is currently used by the JDK Reference implementation.
1046
+ # It is not guaranteed to be examined and used by other implementations.
1047
+ #
1048
+ # The built-in filter allows subclasses of allowed classes and
1049
+ # can approximately be represented as the pattern:
1050
+ #
1051
+ #sun.rmi.registry.registryFilter=\
1052
+ # maxarray=1000000;\
1053
+ # maxdepth=20;\
1054
+ # java.lang.String;\
1055
+ # java.lang.Number;\
1056
+ # java.lang.reflect.Proxy;\
1057
+ # java.rmi.Remote;\
1058
+ # sun.rmi.server.UnicastRef;\
1059
+ # sun.rmi.server.RMIClientSocketFactory;\
1060
+ # sun.rmi.server.RMIServerSocketFactory;\
1061
+ # java.rmi.activation.ActivationID;\
1062
+ # java.rmi.server.UID
1063
+ #
1064
+ # RMI Distributed Garbage Collector (DGC) Serial Filter
1065
+ #
1066
+ # The filter pattern uses the same format as jdk.serialFilter.
1067
+ # This filter can override the builtin filter if additional types need to be
1068
+ # allowed or rejected from the RMI DGC.
1069
+ #
1070
+ # Note: This property is currently used by the JDK Reference implementation.
1071
+ # It is not guaranteed to be examined and used by other implementations.
1072
+ #
1073
+ # The builtin DGC filter can approximately be represented as the filter pattern:
1074
+ #
1075
+ #sun.rmi.transport.dgcFilter=\
1076
+ # java.rmi.server.ObjID;\
1077
+ # java.rmi.server.UID;\
1078
+ # java.rmi.dgc.VMID;\
1079
+ # java.rmi.dgc.Lease;\
1080
+ # maxdepth=5;maxarray=10000
1081
+
1082
+ # CORBA ORBIorTypeCheckRegistryFilter
1083
+ # Type check enhancement for ORB::string_to_object processing
1084
+ #
1085
+ # An IOR type check filter, if configured, is used by an ORB during
1086
+ # an ORB::string_to_object invocation to check the veracity of the type encoded
1087
+ # in the ior string.
1088
+ #
1089
+ # The filter pattern consists of a semi-colon separated list of class names.
1090
+ # The configured list contains the binary class names of the IDL interface types
1091
+ # corresponding to the IDL stub class to be instantiated.
1092
+ # As such, a filter specifies a list of IDL stub classes that will be
1093
+ # allowed by an ORB when an ORB::string_to_object is invoked.
1094
+ # It is used to specify a white list configuration of acceptable
1095
+ # IDL stub types which may be contained in a stringified IOR
1096
+ # parameter passed as input to an ORB::string_to_object method.
1097
+ #
1098
+ # Note: This property is currently used by the JDK Reference implementation.
1099
+ # It is not guaranteed to be examined and used by other implementations.
1100
+ #
1101
+ #com.sun.CORBA.ORBIorTypeCheckRegistryFilter=binary_class_name;binary_class_name
1102
+
1103
+ # The iteration count used for password-based encryption (PBE) in JCEKS
1104
+ # keystores. Values in the range 10000 to 5000000 are considered valid.
1105
+ # If the value is out of this range, or is not a number, or is unspecified;
1106
+ # a default of 200000 is used.
1107
+ #
1108
+ # If the system property jdk.jceks.iterationCount is also specified, it
1109
+ # supersedes the security property value defined here.
1110
+ #
1111
+ #jdk.jceks.iterationCount = 200000
1112
+
1113
+ #
1114
+ # JCEKS Encrypted Key Serial Filter
1115
+ #
1116
+ # This filter, if configured, is used by the JCEKS KeyStore during the
1117
+ # deserialization of the encrypted Key object stored inside a key entry.
1118
+ # If not configured or the filter result is UNDECIDED (i.e. none of the patterns
1119
+ # matches), the filter configured by jdk.serialFilter will be consulted.
1120
+ #
1121
+ # If the system property jceks.key.serialFilter is also specified, it supersedes
1122
+ # the security property value defined here.
1123
+ #
1124
+ # The filter pattern uses the same format as jdk.serialFilter. The default
1125
+ # pattern allows java.lang.Enum, java.security.KeyRep, java.security.KeyRep$Type,
1126
+ # and javax.crypto.spec.SecretKeySpec and rejects all the others.
1127
+ jceks.key.serialFilter = java.base/java.lang.Enum;java.base/java.security.KeyRep;\
1128
+ java.base/java.security.KeyRep$Type;java.base/javax.crypto.spec.SecretKeySpec;!*
1129
+
1130
+ #
1131
+ # PKCS12 KeyStore properties
1132
+ #
1133
+ # The following properties, if configured, are used by the PKCS12 KeyStore
1134
+ # implementation during the creation of a new keystore. Several of the
1135
+ # properties may also be used when modifying an existing keystore. The
1136
+ # properties can be overridden by a KeyStore API that specifies its own
1137
+ # algorithms and parameters.
1138
+ #
1139
+ # If an existing PKCS12 keystore is loaded and then stored, the algorithm and
1140
+ # parameter used to generate the existing Mac will be reused. If the existing
1141
+ # keystore does not have a Mac, no Mac will be created while storing. If there
1142
+ # is at least one certificate in the existing keystore, the algorithm and
1143
+ # parameters used to encrypt the last certificate in the existing keystore will
1144
+ # be reused to encrypt all certificates while storing. If the last certificate
1145
+ # in the existing keystore is not encrypted, all certificates will be stored
1146
+ # unencrypted. If there is no certificate in the existing keystore, any newly
1147
+ # added certificate will be encrypted (or stored unencrypted if algorithm
1148
+ # value is "NONE") using the "keystore.pkcs12.certProtectionAlgorithm" and
1149
+ # "keystore.pkcs12.certPbeIterationCount" values defined here. Existing private
1150
+ # and secret key(s) are not changed. Newly set private and secret key(s) will
1151
+ # be encrypted using the "keystore.pkcs12.keyProtectionAlgorithm" and
1152
+ # "keystore.pkcs12.keyPbeIterationCount" values defined here.
1153
+ #
1154
+ # In order to apply new algorithms and parameters to all entries in an
1155
+ # existing keystore, one can create a new keystore and add entries in the
1156
+ # existing keystore into the new keystore. This can be achieved by calling the
1157
+ # "keytool -importkeystore" command.
1158
+ #
1159
+ # If a system property of the same name is also specified, it supersedes the
1160
+ # security property value defined here.
1161
+ #
1162
+ # If the property is set to an illegal value,
1163
+ # an iteration count that is not a positive integer, or an unknown algorithm
1164
+ # name, an exception will be thrown when the property is used.
1165
+ # If the property is not set or empty, a default value will be used.
1166
+ #
1167
+ # Note: These properties are currently used by the JDK Reference implementation.
1168
+ # They are not guaranteed to be examined and used by other implementations.
1169
+
1170
+ # The algorithm used to encrypt a certificate. This can be any non-Hmac PBE
1171
+ # algorithm defined in the Cipher section of the Java Security Standard
1172
+ # Algorithm Names Specification. When set to "NONE", the certificate
1173
+ # is not encrypted. The default value is "PBEWithHmacSHA256AndAES_256".
1174
+ #keystore.pkcs12.certProtectionAlgorithm = PBEWithHmacSHA256AndAES_256
1175
+
1176
+ # The iteration count used by the PBE algorithm when encrypting a certificate.
1177
+ # This value must be a positive integer. The default value is 10000.
1178
+ #keystore.pkcs12.certPbeIterationCount = 10000
1179
+
1180
+ # The algorithm used to encrypt a private key or secret key. This can be
1181
+ # any non-Hmac PBE algorithm defined in the Cipher section of the Java
1182
+ # Security Standard Algorithm Names Specification. The value must not be "NONE".
1183
+ # The default value is "PBEWithHmacSHA256AndAES_256".
1184
+ #keystore.pkcs12.keyProtectionAlgorithm = PBEWithHmacSHA256AndAES_256
1185
+
1186
+ # The iteration count used by the PBE algorithm when encrypting a private key
1187
+ # or a secret key. This value must be a positive integer. The default value
1188
+ # is 10000.
1189
+ #keystore.pkcs12.keyPbeIterationCount = 10000
1190
+
1191
+ # The algorithm used to calculate the optional MacData at the end of a PKCS12
1192
+ # file. This can be any HmacPBE algorithm defined in the Mac section of the
1193
+ # Java Security Standard Algorithm Names Specification. When set to "NONE",
1194
+ # no Mac is generated. The default value is "HmacPBESHA256".
1195
+ #keystore.pkcs12.macAlgorithm = HmacPBESHA256
1196
+
1197
+ # The iteration count used by the MacData algorithm. This value must be a
1198
+ # positive integer. The default value is 10000.
1199
+ #keystore.pkcs12.macIterationCount = 10000
1200
+
1201
+ #
1202
+ # Enhanced exception message information
1203
+ #
1204
+ # By default, exception messages should not include potentially sensitive
1205
+ # information such as file names, host names, or port numbers. This property
1206
+ # accepts one or more comma separated values, each of which represents a
1207
+ # category of enhanced exception message information to enable. Values are
1208
+ # case-insensitive. Leading and trailing whitespaces, surrounding each value,
1209
+ # are ignored. Unknown values are ignored.
1210
+ #
1211
+ # NOTE: Use caution before setting this property. Setting this property
1212
+ # exposes sensitive information in Exceptions, which could, for example,
1213
+ # propagate to untrusted code or be emitted in stack traces that are
1214
+ # inadvertently disclosed and made accessible over a public network.
1215
+ #
1216
+ # The categories are:
1217
+ #
1218
+ # hostInfo - IOExceptions thrown by java.net.Socket and the socket types in the
1219
+ # java.nio.channels package will contain enhanced exception
1220
+ # message information
1221
+ #
1222
+ # The property setting in this file can be overridden by a system property of
1223
+ # the same name, with the same syntax and possible values.
1224
+ #
1225
+ #jdk.includeInExceptions=hostInfo
1226
+
1227
+ #
1228
+ # Disabled mechanisms for the Simple Authentication and Security Layer (SASL)
1229
+ #
1230
+ # Disabled mechanisms will not be negotiated by both SASL clients and servers.
1231
+ # These mechanisms will be ignored if they are specified in the "mechanisms"
1232
+ # argument of "Sasl.createSaslClient" or the "mechanism" argument of
1233
+ # "Sasl.createSaslServer".
1234
+ #
1235
+ # The value of this property is a comma-separated list of SASL mechanisms.
1236
+ # The mechanisms are case-sensitive. Whitespaces around the commas are ignored.
1237
+ #
1238
+ # Note: This property is currently used by the JDK Reference implementation.
1239
+ # It is not guaranteed to be examined and used by other implementations.
1240
+ #
1241
+ # Example:
1242
+ # jdk.sasl.disabledMechanisms=PLAIN, CRAM-MD5, DIGEST-MD5
1243
+ jdk.sasl.disabledMechanisms=
1244
+
1245
+ #
1246
+ # Policies for distrusting Certificate Authorities (CAs).
1247
+ #
1248
+ # This is a comma separated value of one or more case-sensitive strings, each
1249
+ # of which represents a policy for determining if a CA should be distrusted.
1250
+ # The supported values are:
1251
+ #
1252
+ # SYMANTEC_TLS : Distrust TLS Server certificates anchored by a Symantec
1253
+ # root CA and issued after April 16, 2019 unless issued by one of the
1254
+ # following subordinate CAs which have a later distrust date:
1255
+ # 1. Apple IST CA 2 - G1, SHA-256 fingerprint:
1256
+ # AC2B922ECFD5E01711772FEA8ED372DE9D1E2245FCE3F57A9CDBEC77296A424B
1257
+ # Distrust after December 31, 2019.
1258
+ # 2. Apple IST CA 8 - G1, SHA-256 fingerprint:
1259
+ # A4FE7C7F15155F3F0AEF7AAA83CF6E06DEB97CA3F909DF920AC1490882D488ED
1260
+ # Distrust after December 31, 2019.
1261
+ #
1262
+ # Leading and trailing whitespace surrounding each value are ignored.
1263
+ # Unknown values are ignored. If the property is commented out or set to the
1264
+ # empty String, no policies are enforced.
1265
+ #
1266
+ # Note: This property is currently used by the JDK Reference implementation.
1267
+ # It is not guaranteed to be supported by other SE implementations. Also, this
1268
+ # property does not override other security properties which can restrict
1269
+ # certificates such as jdk.tls.disabledAlgorithms or
1270
+ # jdk.certpath.disabledAlgorithms; those restrictions are still enforced even
1271
+ # if this property is not enabled.
1272
+ #
1273
+ jdk.security.caDistrustPolicies=SYMANTEC_TLS
1274
+
1275
+ #
1276
+ # FilePermission path canonicalization
1277
+ #
1278
+ # This security property dictates how the path argument is processed and stored
1279
+ # while constructing a FilePermission object. If the value is set to true, the
1280
+ # path argument is canonicalized and FilePermission methods (such as implies,
1281
+ # equals, and hashCode) are implemented based on this canonicalized result.
1282
+ # Otherwise, the path argument is not canonicalized and FilePermission methods are
1283
+ # implemented based on the original input. See the implementation note of the
1284
+ # FilePermission class for more details.
1285
+ #
1286
+ # If a system property of the same name is also specified, it supersedes the
1287
+ # security property value defined here.
1288
+ #
1289
+ # The default value for this property is false.
1290
+ #
1291
+ jdk.io.permissionsUseCanonicalPath=false
1292
+
1293
+
1294
+ #
1295
+ # Policies for the proxy_impersonator Kerberos ccache configuration entry
1296
+ #
1297
+ # The proxy_impersonator ccache configuration entry indicates that the ccache
1298
+ # is a synthetic delegated credential for use with S4U2Proxy by an intermediate
1299
+ # server. The ccache file should also contain the TGT of this server and
1300
+ # an evidence ticket from the default principal of the ccache to this server.
1301
+ #
1302
+ # This security property determines how Java uses this configuration entry.
1303
+ # There are 3 possible values:
1304
+ #
1305
+ # no-impersonate - Ignore this configuration entry, and always act as
1306
+ # the owner of the TGT (if it exists).
1307
+ #
1308
+ # try-impersonate - Try impersonation when this configuration entry exists.
1309
+ # If no matching TGT or evidence ticket is found,
1310
+ # fallback to no-impersonate.
1311
+ #
1312
+ # always-impersonate - Always impersonate when this configuration entry exists.
1313
+ # If no matching TGT or evidence ticket is found,
1314
+ # no initial credential is read from the ccache.
1315
+ #
1316
+ # The default value is "always-impersonate".
1317
+ #
1318
+ # If a system property of the same name is also specified, it supersedes the
1319
+ # security property value defined here.
1320
+ #
1321
+ #jdk.security.krb5.default.initiate.credential=always-impersonate
1322
+
1323
+ #
1324
+ # Trust Anchor Certificates - CA Basic Constraint check
1325
+ #
1326
+ # X.509 v3 certificates used as Trust Anchors (to validate signed code or TLS
1327
+ # connections) must have the cA Basic Constraint field set to 'true'. Also, if
1328
+ # they include a Key Usage extension, the keyCertSign bit must be set. These
1329
+ # checks, enabled by default, can be disabled for backward-compatibility
1330
+ # purposes with the jdk.security.allowNonCaAnchor System and Security
1331
+ # properties. In the case that both properties are simultaneously set, the
1332
+ # System value prevails. The default value of the property is "false".
1333
+ #
1334
+ #jdk.security.allowNonCaAnchor=true
1335
+
1336
+ # JNDI Object Factories Filter
1337
+ #
1338
+ # This filter is used by the JNDI runtime to control the set of object factory classes
1339
+ # which will be allowed to instantiate objects from object references returned by
1340
+ # naming/directory systems. The factory class named by the reference instance will be
1341
+ # matched against this filter. The filter property supports pattern-based filter syntax
1342
+ # with the same format as jdk.serialFilter.
1343
+ #
1344
+ # Each pattern is matched against the factory class name to allow or disallow it's
1345
+ # instantiation. The access to a factory class is allowed unless the filter returns
1346
+ # REJECTED.
1347
+ #
1348
+ # Note: This property is currently used by the JDK Reference implementation.
1349
+ # It is not guaranteed to be examined and used by other implementations.
1350
+ #
1351
+ # If the system property jdk.jndi.object.factoriesFilter is also specified, it supersedes
1352
+ # the security property value defined here. The default value of the property is "*".
1353
+ #
1354
+ # The default pattern value allows any object factory class specified by the reference
1355
+ # instance to recreate the referenced object.
1356
+ #jdk.jndi.object.factoriesFilter=*
1357
+
1358
+ #
1359
+ # The default Character set name (java.nio.charset.Charset.forName())
1360
+ # for converting TLS ALPN values between byte arrays and Strings.
1361
+ # Prior versions of the JDK may use UTF-8 as the default charset. If
1362
+ # you experience interoperability issues, setting this property to UTF-8
1363
+ # may help.
1364
+ #
1365
+ # jdk.tls.alpnCharset=UTF-8
1366
+ jdk.tls.alpnCharset=ISO_8859_1