JDK-4287267 : Subdivide the "system security domain".
  • Type: Enhancement
  • Component: security-libs
  • Sub-Component: java.security
  • Affected Version: 1.4.0
  • Priority: P4
  • Status: Closed
  • Resolution: Won't Fix
  • OS: generic
  • CPU: generic
  • Submitted: 1999-11-02
  • Updated: 2014-05-01
  • Resolved: 2014-05-01
Related Reports
Relates :  
Description
Name: me32167			Date: 11/02/99


Subdivide the "system security domain" so that each core class in the Java
runtime has the least set of privileges required to perform its function.
This includes the native methods.

Identify the security permission(s) required of code calling an entry point
(static or instance methods) into the JRE.   Permissions are typically
allocated based on CodeSource (the signers/code base URL).  Also, any
SecurityManager.check*() method calls since not all SecurityManagers call
AccessController.checkPermission().

Identify those permissions required of middleware or application classes to
run in a JRE/JDK.  This includes the identification of calls to
SecurityManager.check*() methods.

Identify whether middleware needs to run with a SecurityManager by
analyzing application code to see whether it makes calls which require
security permissions.  If the application code does not make calls that
would result in security authorization decisions via the SecurityManager,
the middleware does not need to install a SecurityManager, resulting in
improved JRE throughput.

======================================================================

Comments
This has been open since 1999 without being addressed. I am closing this now because it has not been addressed since then and there are a couple of other RFEs on the horizon that should address the primary issue in this RFE of only granting permissions to code such that it adheres to the principal of least privilege: 1. JDK 8040059 Change default policy for extensions to no permission 2. Modules (Project Jigsaw) - extending the policy and permissions model to grant only the permissions needed to each module
01-05-2014

EVALUATION Should be part of a security roadmap. david.biagini@Eng 2000-01-20
20-01-2000