1. Install jre9 nightly build from http://jre.us.oracle.com/java/re/jdk/9/jdk9-client/latest/bundles/windows-i586/jre-9-ea-windows-i586.exe 2. Download http://sqeweb.us.oracle.com/net/sqenfs-1/export1/comp/quality1/deployment2/larry/tmpcert/self.valid.cert and import into keystore: "c:\Program Files (x86)\Java\jre1.9.0\bin\keytool.exe" -import -file self.valid.cert -keystore "c:\Program Files (x86)\Java\jre1.9.0\lib\security\cacerts" -storepass changeit -alias validSelfSign -noprompt 3. In browser load applet: http://sqeweb.us.oracle.com/net/sqenfs-1/export1/comp/quality1/deployment2/larry/appletattack/html/testZeroWidthGifImage.html 4. If the applet is blocked, the issue is reproduced. The applet is signed with trusted certificate and requesting sandbox permission. The same applet can load fine with 8u25 b11.
|