JDK-8264362 : Disable SHA-1 Signed JARs
  • Type: CSR
  • Component: security-libs
  • Sub-Component: java.security
  • Priority: P2
  • Status: Closed
  • Resolution: Approved
  • Fix Versions: 7u311,8u301,11.0.17,16.0.2,17.0.5
  • Submitted: 2021-03-29
  • Updated: 2022-11-25
  • Resolved: 2021-04-28
Related Reports
CSR :  
CSR :  
CSR :  
CSR :  
Relates :  
Relates :  
Relates :  
Description
Summary
-------

Disable JARs signed with algorithms using SHA-1 by default, and treat them as unsigned.

Problem
-------

SHA-1 is a digest algorithm that is no longer recommended.

Solution
--------

JARs signed with SHA-1 algorithms will be disabled by default and treated as if they were unsigned. This applies to the algorithms used to digest, sign, and optionally timestamp the JAR. It also applies to the signature and digest algorithms of the certificates in the certificate chain of the code signer and the Timestamp Authority, and any CRLs or OCSP responses that are used to verify if those certificates have been revoked.

In order to reduce the compatibility risk for applications that have been previously timestamped or use private CAs, there are two exceptions to this policy:

 1. Any JAR signed with SHA-1 algorithms and timestamped prior to January 01, 2019 will not be restricted.
 2. Any JAR signed with a SHA-1 certificate that does not chain back to a Root CA included by default in the JDK `cacerts` keystore will not be restricted.

This policy is subject to change and may be made more restrictive.

Specification
-------------

The default values of the `jdk.certpath.disabledAlgorithms` and `jdk.jar.disabledAlgorithms` security properties will be adjusted as follows:

```
  jdk.certpath.disabledAlgorithms=MD2, MD5, SHA1 jdkCA & usage TLSServer, \
-     RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224
+     RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, \
+     SHA1 jdkCA & usage SignedJAR & denyAfter 2019-01-01
```
```
  jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, \
-       DSA keySize < 1024
+       DSA keySize < 1024, SHA1 jdkCA & denyAfter 2019-01-01
```

Comments
I updated the Fix Versions because the orignal change had been backed out, but now applied again. 11.0.12->11.0.17, 17->17.0.5
29-07-2022

Moving to Approved.
28-04-2021

I see release note are already planned and the change in SHA-1 handling is in the crypto roadmap; moving to Provisional.
16-04-2021