OPENJDK-4559: Red Hat Build of OpenJDK 25 should not restrict all the providers in FIPS#45
Conversation
Only restrict the SUN, SunEC, SunJCE and SunRsaSign services. This makes the fips-25u patch behave as the fips-21u patch, but with fewer changes.
|
@gnu-andrew: I'm realizing the We will still miss the 25.0.3 changes, I don't know how do you prefer handle this situation. It's clear that we can sync with 25.0.3 after the April unembargo, but at that point you already created the FIPS patch for the RPM. So an embargoed sync is required. |
The sync is only technically required when the patch will break when applied against the updated OpenJDK sources. It is preferable to do it every release, but I know we've skipped a few releases in the past where it hasn't been necessary.
Just don't merge it via the merge request as it'll squash it all. I can check it over and do a direct push. Thanks for doing it. |
gnu-andrew
left a comment
There was a problem hiding this comment.
This looks good to me. I assume the main change is that allowedServiceTypes can now be null? The ANY_SERVICE_TYPE becomes redundant due to this change as SunPKCS11-FIPS, SunJSSE & XMLDSig can go through the null return as with third party providers. So we are now only filtering SunEC, SUN, SunJCE and SunRsaSign.
Ok, please find the PR at #46. |
OPENJDK-4559: Red Hat Build of OpenJDK 25 should not restrict all the providers in FIPS
Hi,
This pull request addresses the problem described in OPENJDK-4559.
The
RedHatFIPSFilterimplemented by df04441 infips-25uis too restrictive. This change restores thefips-21ubehavior, where the user is allowed to insert security providers without any validation. Otherwise, the user has no alternative when they need to use a third-party security provider.Testing
I locally built a release image from the sources, and applied the
create-redhat-properties-files.bashsetup (with a local build of nssadapter v0.1.1), then copied the image to a RHEL 9 VM with FIPS-mode enabled.Manual execution of a simple PKCS #12 keystore test
nssadapteris being used (we can see its log messages). This shows that SunPKCS11, despite no longer being part of the patch, is being allowed, as would any other third-party provider.RedHatFIPSFiltermessages are also printed, indicating that it is filtering the OpenJDK bundled security providers:Execution of
ssl-testsAll the tests are either passing or being skipped.
Expand to see the results