JDK-8025890 : liveconnect dialog is showing the publisher unknown
  • Type: Bug
  • Component: deploy
  • Sub-Component: plugin
  • Affected Version: 7u45
  • Priority: P3
  • Status: Closed
  • Resolution: Fixed
  • OS: windows_7
  • CPU: x86
  • Submitted: 2013-10-03
  • Updated: 2016-02-26
  • Resolved: 2013-10-22
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
7u51 b04Fixed 8Fixed
Tried to verify the fix for 8024355 with latest Java 7u45 build,the applets load fine but
the warning message popup is 

1) showing the publisher unknown even though the
applets were signed with valid CA/publisher having valid certificate.

2) The java applets are working fine but the warning messages being prompted to
user don���t confirm that the JS being executed is from trusted source and what
is the applet name or application name which is trying to call the JS.
3) Additionally the default message recommends user to block the execution and
accept only if it���s from trusted source but publisher and application name is
shown as unknown.
"Allow access only if you trust the web site and know that the application is intended to run on this site"

testcase: http://oklahoma.us.oracle.com/www/tests/1.7.0_51/8025890/bug.html webrev: http://oklahoma.us.oracle.com/www/webrevs/aherrick/1.7.0_51/8025890/deploy

The sequence of checks in getValidationState is as follows: 1.a) loop thru certs checking expiration state - to see if cert is not yet valid or expired. 1.b) check if it is timestamped, and was valid when timestamped - result of 1) is state.timeValid, and state.certValidity 2.) (if not skip flag) - check if cert is in session store - if so return setting state.trustDecidion to GRANTED_FOR_THIS_SESSION 3.) loop thru certs looking for blacklisted cert (can throw exception to exit) 4.) see if root cert is in CA - set state.rootCAValid to false if not. 5.) validitate chain - this can also set state.rootCAValid to false or throw exception 6.) (if not skip flag) perform revocation check (can throw exception) 7.) see if it is in denied store (if so, set state.trustDecision = DENIED and return) 8.) if state.rootCAValid is false, if so , return here (setting state.trustDecidion.UNKNOWN) 9.) set state.publisher to the string extracted from the first cert in the chain. 10.) check if the cert is in the permanent trust stores, if it is, set state.trustDecidion to state.expirationDate, and return. 11.) set state.trustDecidion.UNKNOWN and return So the problem is as follows: we need to get to step 9, which requires 4, 5, and 8 in even in the case of step 2, where cert is already in session store. but in this case we don't want to do other steps, 3 and 6. Step 7 really doesn't really mater, since cert cant be both accepted and denied in one session. so answer is simple, in step 2, instead of exiting, we just set a flag (which can even be the trustDecision set to GRANTED_FOR_SESSION), that causes us to skip steps 3, 6,7, we can even move step 3 so it is after 5, and all the steps being skipped will be together. The above steps have clause, "if not skip flag" which is referring to the existing input arg "skipSessionStoreAndRevocationCheck" this is not actually used anymore as getValidationState is only called now from SandboxSecurity and TrustDecider itself, and in each case the arg is false.

SQE is OK to fix that in 7u51 assuming the fix comes before RDP2

SQE OK to defer the bug as far as this is not a stopper for CPU13_04

a little investigation shows: Problem starts in TrustDecider.validateChain, where it calls lap.storeMainPublisherAndTitle with the publisher from the ValidationState. but publisher is only set in validationState if we get thru to point where it is known to be ca-signed. but if the cert is already in the session store, we don't get that far. The lap is trying to take care of this by only setting it only once in DefaultLocalApplicationsProperties.storeMainPublisherAndTitle() (it won't set unless both are null) , and clearing these fields when an applet starts. But when there are multiple applets with the same certificate, and it is not the first applet that does live connect calls, the second applet will never verify the signature (it is already in the trusted session store), so it never sets the publisher field in the ValidationState, so verifyChain then calls storeMainPublisherAndTitle(null, null) and the result is UNKNOWN There is not really a race condition, it will happen any there are more than one applet signed by the same cert, or when the same applet is invoked from multiple html pages, or in some cases when an app is reloaded. run http://javaweb.us.oracle.com/~tvng/liveconnect/signed/javacom.html then after accepting security dialog - deny the liveconnect dialog. (first time it seems to have publisher correct) Then reload it, now the session store is still containing the cert, so the dialog will have publisher UNKNOWN

the original application used to verify the original fix for https://bug.oraclecorp.com/pls/bug/webbug_print.show?c_rptno=17415131 was: http://slc05anb.us.oracle.com/callcenter_enu @ Login : sadmin/sadmin this is no longer available. please provide address where this can be demonstrated.